pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -16,40 +16,31 @@ class SecretBackendArgs:
|
|
16
16
|
def __init__(__self__, *,
|
17
17
|
path: pulumi.Input[str],
|
18
18
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
19
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
19
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
20
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
21
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
23
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
24
22
|
description: Optional[pulumi.Input[str]] = None,
|
25
23
|
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
26
24
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
27
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
28
25
|
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
29
26
|
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
30
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
31
27
|
local: Optional[pulumi.Input[bool]] = None,
|
32
28
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
33
29
|
namespace: Optional[pulumi.Input[str]] = None,
|
34
30
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
35
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
36
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
37
31
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
38
32
|
service_account_jwt: Optional[pulumi.Input[str]] = None):
|
39
33
|
"""
|
40
34
|
The set of arguments for constructing a SecretBackend resource.
|
41
35
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
42
36
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
43
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
44
37
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
45
38
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
46
39
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
47
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
48
40
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
49
41
|
:param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
50
42
|
service account JWT when Vault is running in a Kubernetes pod.
|
51
43
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
52
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
53
44
|
:param pulumi.Input[str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
54
45
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
55
46
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
@@ -57,7 +48,6 @@ class SecretBackendArgs:
|
|
57
48
|
:param pulumi.Input[str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
58
49
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
59
50
|
are not set on the host that Vault is running on.
|
60
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
61
51
|
:param pulumi.Input[bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
62
52
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
63
53
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -65,8 +55,6 @@ class SecretBackendArgs:
|
|
65
55
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
66
56
|
*Available only for Vault Enterprise*.
|
67
57
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
68
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
69
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
70
58
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
71
59
|
:param pulumi.Input[str] service_account_jwt: The JSON web token of the service account used by the
|
72
60
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
@@ -75,30 +63,22 @@ class SecretBackendArgs:
|
|
75
63
|
pulumi.set(__self__, "path", path)
|
76
64
|
if allowed_managed_keys is not None:
|
77
65
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
78
|
-
if allowed_response_headers is not None:
|
79
|
-
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
80
66
|
if audit_non_hmac_request_keys is not None:
|
81
67
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
82
68
|
if audit_non_hmac_response_keys is not None:
|
83
69
|
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
84
70
|
if default_lease_ttl_seconds is not None:
|
85
71
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
86
|
-
if delegated_auth_accessors is not None:
|
87
|
-
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
88
72
|
if description is not None:
|
89
73
|
pulumi.set(__self__, "description", description)
|
90
74
|
if disable_local_ca_jwt is not None:
|
91
75
|
pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
|
92
76
|
if external_entropy_access is not None:
|
93
77
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
94
|
-
if identity_token_key is not None:
|
95
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
96
78
|
if kubernetes_ca_cert is not None:
|
97
79
|
pulumi.set(__self__, "kubernetes_ca_cert", kubernetes_ca_cert)
|
98
80
|
if kubernetes_host is not None:
|
99
81
|
pulumi.set(__self__, "kubernetes_host", kubernetes_host)
|
100
|
-
if listing_visibility is not None:
|
101
|
-
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
102
82
|
if local is not None:
|
103
83
|
pulumi.set(__self__, "local", local)
|
104
84
|
if max_lease_ttl_seconds is not None:
|
@@ -107,10 +87,6 @@ class SecretBackendArgs:
|
|
107
87
|
pulumi.set(__self__, "namespace", namespace)
|
108
88
|
if options is not None:
|
109
89
|
pulumi.set(__self__, "options", options)
|
110
|
-
if passthrough_request_headers is not None:
|
111
|
-
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
112
|
-
if plugin_version is not None:
|
113
|
-
pulumi.set(__self__, "plugin_version", plugin_version)
|
114
90
|
if seal_wrap is not None:
|
115
91
|
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
116
92
|
if service_account_jwt is not None:
|
@@ -140,18 +116,6 @@ class SecretBackendArgs:
|
|
140
116
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
141
117
|
pulumi.set(self, "allowed_managed_keys", value)
|
142
118
|
|
143
|
-
@property
|
144
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
145
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
146
|
-
"""
|
147
|
-
List of headers to allow and pass from the request to the plugin
|
148
|
-
"""
|
149
|
-
return pulumi.get(self, "allowed_response_headers")
|
150
|
-
|
151
|
-
@allowed_response_headers.setter
|
152
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
153
|
-
pulumi.set(self, "allowed_response_headers", value)
|
154
|
-
|
155
119
|
@property
|
156
120
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
157
121
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -188,18 +152,6 @@ class SecretBackendArgs:
|
|
188
152
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
189
153
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
190
154
|
|
191
|
-
@property
|
192
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
193
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
194
|
-
"""
|
195
|
-
List of headers to allow and pass from the request to the plugin
|
196
|
-
"""
|
197
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
198
|
-
|
199
|
-
@delegated_auth_accessors.setter
|
200
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
201
|
-
pulumi.set(self, "delegated_auth_accessors", value)
|
202
|
-
|
203
155
|
@property
|
204
156
|
@pulumi.getter
|
205
157
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -237,18 +189,6 @@ class SecretBackendArgs:
|
|
237
189
|
def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
|
238
190
|
pulumi.set(self, "external_entropy_access", value)
|
239
191
|
|
240
|
-
@property
|
241
|
-
@pulumi.getter(name="identityTokenKey")
|
242
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
243
|
-
"""
|
244
|
-
The key to use for signing plugin workload identity tokens
|
245
|
-
"""
|
246
|
-
return pulumi.get(self, "identity_token_key")
|
247
|
-
|
248
|
-
@identity_token_key.setter
|
249
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
250
|
-
pulumi.set(self, "identity_token_key", value)
|
251
|
-
|
252
192
|
@property
|
253
193
|
@pulumi.getter(name="kubernetesCaCert")
|
254
194
|
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[str]]:
|
@@ -278,18 +218,6 @@ class SecretBackendArgs:
|
|
278
218
|
def kubernetes_host(self, value: Optional[pulumi.Input[str]]):
|
279
219
|
pulumi.set(self, "kubernetes_host", value)
|
280
220
|
|
281
|
-
@property
|
282
|
-
@pulumi.getter(name="listingVisibility")
|
283
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
284
|
-
"""
|
285
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
286
|
-
"""
|
287
|
-
return pulumi.get(self, "listing_visibility")
|
288
|
-
|
289
|
-
@listing_visibility.setter
|
290
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
291
|
-
pulumi.set(self, "listing_visibility", value)
|
292
|
-
|
293
221
|
@property
|
294
222
|
@pulumi.getter
|
295
223
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -341,30 +269,6 @@ class SecretBackendArgs:
|
|
341
269
|
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
342
270
|
pulumi.set(self, "options", value)
|
343
271
|
|
344
|
-
@property
|
345
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
346
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
347
|
-
"""
|
348
|
-
List of headers to allow and pass from the request to the plugin
|
349
|
-
"""
|
350
|
-
return pulumi.get(self, "passthrough_request_headers")
|
351
|
-
|
352
|
-
@passthrough_request_headers.setter
|
353
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
354
|
-
pulumi.set(self, "passthrough_request_headers", value)
|
355
|
-
|
356
|
-
@property
|
357
|
-
@pulumi.getter(name="pluginVersion")
|
358
|
-
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
359
|
-
"""
|
360
|
-
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
361
|
-
"""
|
362
|
-
return pulumi.get(self, "plugin_version")
|
363
|
-
|
364
|
-
@plugin_version.setter
|
365
|
-
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
366
|
-
pulumi.set(self, "plugin_version", value)
|
367
|
-
|
368
272
|
@property
|
369
273
|
@pulumi.getter(name="sealWrap")
|
370
274
|
def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
|
@@ -397,41 +301,32 @@ class _SecretBackendState:
|
|
397
301
|
def __init__(__self__, *,
|
398
302
|
accessor: Optional[pulumi.Input[str]] = None,
|
399
303
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
400
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
401
304
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
402
305
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
403
306
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
404
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
405
307
|
description: Optional[pulumi.Input[str]] = None,
|
406
308
|
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
407
309
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
408
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
409
310
|
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
410
311
|
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
411
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
412
312
|
local: Optional[pulumi.Input[bool]] = None,
|
413
313
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
414
314
|
namespace: Optional[pulumi.Input[str]] = None,
|
415
315
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
416
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
417
316
|
path: Optional[pulumi.Input[str]] = None,
|
418
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
419
317
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
420
318
|
service_account_jwt: Optional[pulumi.Input[str]] = None):
|
421
319
|
"""
|
422
320
|
Input properties used for looking up and filtering SecretBackend resources.
|
423
321
|
:param pulumi.Input[str] accessor: Accessor of the mount
|
424
322
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
425
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
426
323
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
427
324
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
428
325
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
429
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
430
326
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
431
327
|
:param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
432
328
|
service account JWT when Vault is running in a Kubernetes pod.
|
433
329
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
434
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
435
330
|
:param pulumi.Input[str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
436
331
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
437
332
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
@@ -439,7 +334,6 @@ class _SecretBackendState:
|
|
439
334
|
:param pulumi.Input[str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
440
335
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
441
336
|
are not set on the host that Vault is running on.
|
442
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
443
337
|
:param pulumi.Input[bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
444
338
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
445
339
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -447,9 +341,7 @@ class _SecretBackendState:
|
|
447
341
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
448
342
|
*Available only for Vault Enterprise*.
|
449
343
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
450
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
451
344
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
452
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
453
345
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
454
346
|
:param pulumi.Input[str] service_account_jwt: The JSON web token of the service account used by the
|
455
347
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
@@ -459,30 +351,22 @@ class _SecretBackendState:
|
|
459
351
|
pulumi.set(__self__, "accessor", accessor)
|
460
352
|
if allowed_managed_keys is not None:
|
461
353
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
462
|
-
if allowed_response_headers is not None:
|
463
|
-
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
464
354
|
if audit_non_hmac_request_keys is not None:
|
465
355
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
466
356
|
if audit_non_hmac_response_keys is not None:
|
467
357
|
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
468
358
|
if default_lease_ttl_seconds is not None:
|
469
359
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
470
|
-
if delegated_auth_accessors is not None:
|
471
|
-
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
472
360
|
if description is not None:
|
473
361
|
pulumi.set(__self__, "description", description)
|
474
362
|
if disable_local_ca_jwt is not None:
|
475
363
|
pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
|
476
364
|
if external_entropy_access is not None:
|
477
365
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
478
|
-
if identity_token_key is not None:
|
479
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
480
366
|
if kubernetes_ca_cert is not None:
|
481
367
|
pulumi.set(__self__, "kubernetes_ca_cert", kubernetes_ca_cert)
|
482
368
|
if kubernetes_host is not None:
|
483
369
|
pulumi.set(__self__, "kubernetes_host", kubernetes_host)
|
484
|
-
if listing_visibility is not None:
|
485
|
-
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
486
370
|
if local is not None:
|
487
371
|
pulumi.set(__self__, "local", local)
|
488
372
|
if max_lease_ttl_seconds is not None:
|
@@ -491,12 +375,8 @@ class _SecretBackendState:
|
|
491
375
|
pulumi.set(__self__, "namespace", namespace)
|
492
376
|
if options is not None:
|
493
377
|
pulumi.set(__self__, "options", options)
|
494
|
-
if passthrough_request_headers is not None:
|
495
|
-
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
496
378
|
if path is not None:
|
497
379
|
pulumi.set(__self__, "path", path)
|
498
|
-
if plugin_version is not None:
|
499
|
-
pulumi.set(__self__, "plugin_version", plugin_version)
|
500
380
|
if seal_wrap is not None:
|
501
381
|
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
502
382
|
if service_account_jwt is not None:
|
@@ -526,18 +406,6 @@ class _SecretBackendState:
|
|
526
406
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
527
407
|
pulumi.set(self, "allowed_managed_keys", value)
|
528
408
|
|
529
|
-
@property
|
530
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
531
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
532
|
-
"""
|
533
|
-
List of headers to allow and pass from the request to the plugin
|
534
|
-
"""
|
535
|
-
return pulumi.get(self, "allowed_response_headers")
|
536
|
-
|
537
|
-
@allowed_response_headers.setter
|
538
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
539
|
-
pulumi.set(self, "allowed_response_headers", value)
|
540
|
-
|
541
409
|
@property
|
542
410
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
543
411
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -574,18 +442,6 @@ class _SecretBackendState:
|
|
574
442
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
575
443
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
576
444
|
|
577
|
-
@property
|
578
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
579
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
580
|
-
"""
|
581
|
-
List of headers to allow and pass from the request to the plugin
|
582
|
-
"""
|
583
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
584
|
-
|
585
|
-
@delegated_auth_accessors.setter
|
586
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
587
|
-
pulumi.set(self, "delegated_auth_accessors", value)
|
588
|
-
|
589
445
|
@property
|
590
446
|
@pulumi.getter
|
591
447
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -623,18 +479,6 @@ class _SecretBackendState:
|
|
623
479
|
def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
|
624
480
|
pulumi.set(self, "external_entropy_access", value)
|
625
481
|
|
626
|
-
@property
|
627
|
-
@pulumi.getter(name="identityTokenKey")
|
628
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
629
|
-
"""
|
630
|
-
The key to use for signing plugin workload identity tokens
|
631
|
-
"""
|
632
|
-
return pulumi.get(self, "identity_token_key")
|
633
|
-
|
634
|
-
@identity_token_key.setter
|
635
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
636
|
-
pulumi.set(self, "identity_token_key", value)
|
637
|
-
|
638
482
|
@property
|
639
483
|
@pulumi.getter(name="kubernetesCaCert")
|
640
484
|
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[str]]:
|
@@ -664,18 +508,6 @@ class _SecretBackendState:
|
|
664
508
|
def kubernetes_host(self, value: Optional[pulumi.Input[str]]):
|
665
509
|
pulumi.set(self, "kubernetes_host", value)
|
666
510
|
|
667
|
-
@property
|
668
|
-
@pulumi.getter(name="listingVisibility")
|
669
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
670
|
-
"""
|
671
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
672
|
-
"""
|
673
|
-
return pulumi.get(self, "listing_visibility")
|
674
|
-
|
675
|
-
@listing_visibility.setter
|
676
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
677
|
-
pulumi.set(self, "listing_visibility", value)
|
678
|
-
|
679
511
|
@property
|
680
512
|
@pulumi.getter
|
681
513
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -727,18 +559,6 @@ class _SecretBackendState:
|
|
727
559
|
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
728
560
|
pulumi.set(self, "options", value)
|
729
561
|
|
730
|
-
@property
|
731
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
732
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
733
|
-
"""
|
734
|
-
List of headers to allow and pass from the request to the plugin
|
735
|
-
"""
|
736
|
-
return pulumi.get(self, "passthrough_request_headers")
|
737
|
-
|
738
|
-
@passthrough_request_headers.setter
|
739
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
740
|
-
pulumi.set(self, "passthrough_request_headers", value)
|
741
|
-
|
742
562
|
@property
|
743
563
|
@pulumi.getter
|
744
564
|
def path(self) -> Optional[pulumi.Input[str]]:
|
@@ -751,18 +571,6 @@ class _SecretBackendState:
|
|
751
571
|
def path(self, value: Optional[pulumi.Input[str]]):
|
752
572
|
pulumi.set(self, "path", value)
|
753
573
|
|
754
|
-
@property
|
755
|
-
@pulumi.getter(name="pluginVersion")
|
756
|
-
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
757
|
-
"""
|
758
|
-
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
759
|
-
"""
|
760
|
-
return pulumi.get(self, "plugin_version")
|
761
|
-
|
762
|
-
@plugin_version.setter
|
763
|
-
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
764
|
-
pulumi.set(self, "plugin_version", value)
|
765
|
-
|
766
574
|
@property
|
767
575
|
@pulumi.getter(name="sealWrap")
|
768
576
|
def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
|
@@ -796,34 +604,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
796
604
|
resource_name: str,
|
797
605
|
opts: Optional[pulumi.ResourceOptions] = None,
|
798
606
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
799
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
800
607
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
801
608
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
802
609
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
803
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
804
610
|
description: Optional[pulumi.Input[str]] = None,
|
805
611
|
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
806
612
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
807
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
808
613
|
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
809
614
|
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
810
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
811
615
|
local: Optional[pulumi.Input[bool]] = None,
|
812
616
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
813
617
|
namespace: Optional[pulumi.Input[str]] = None,
|
814
618
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
815
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
816
619
|
path: Optional[pulumi.Input[str]] = None,
|
817
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
818
620
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
819
621
|
service_account_jwt: Optional[pulumi.Input[str]] = None,
|
820
622
|
__props__=None):
|
821
623
|
"""
|
822
624
|
## Example Usage
|
823
625
|
|
626
|
+
<!--Start PulumiCodeChooser -->
|
824
627
|
```python
|
825
628
|
import pulumi
|
826
|
-
import pulumi_std as std
|
827
629
|
import pulumi_vault as vault
|
828
630
|
|
829
631
|
config = vault.kubernetes.SecretBackend("config",
|
@@ -832,10 +634,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
832
634
|
default_lease_ttl_seconds=43200,
|
833
635
|
max_lease_ttl_seconds=86400,
|
834
636
|
kubernetes_host="https://127.0.0.1:61233",
|
835
|
-
kubernetes_ca_cert=
|
836
|
-
service_account_jwt=
|
637
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
638
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
837
639
|
disable_local_ca_jwt=False)
|
838
640
|
```
|
641
|
+
<!--End PulumiCodeChooser -->
|
839
642
|
|
840
643
|
## Import
|
841
644
|
|
@@ -848,16 +651,13 @@ class SecretBackend(pulumi.CustomResource):
|
|
848
651
|
:param str resource_name: The name of the resource.
|
849
652
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
850
653
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
851
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
852
654
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
853
655
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
854
656
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
855
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
856
657
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
857
658
|
:param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
858
659
|
service account JWT when Vault is running in a Kubernetes pod.
|
859
660
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
860
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
861
661
|
:param pulumi.Input[str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
862
662
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
863
663
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
@@ -865,7 +665,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
865
665
|
:param pulumi.Input[str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
866
666
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
867
667
|
are not set on the host that Vault is running on.
|
868
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
869
668
|
:param pulumi.Input[bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
870
669
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
871
670
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -873,9 +672,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
873
672
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
874
673
|
*Available only for Vault Enterprise*.
|
875
674
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
876
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
877
675
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
878
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
879
676
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
880
677
|
:param pulumi.Input[str] service_account_jwt: The JSON web token of the service account used by the
|
881
678
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
@@ -890,9 +687,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
890
687
|
"""
|
891
688
|
## Example Usage
|
892
689
|
|
690
|
+
<!--Start PulumiCodeChooser -->
|
893
691
|
```python
|
894
692
|
import pulumi
|
895
|
-
import pulumi_std as std
|
896
693
|
import pulumi_vault as vault
|
897
694
|
|
898
695
|
config = vault.kubernetes.SecretBackend("config",
|
@@ -901,10 +698,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
901
698
|
default_lease_ttl_seconds=43200,
|
902
699
|
max_lease_ttl_seconds=86400,
|
903
700
|
kubernetes_host="https://127.0.0.1:61233",
|
904
|
-
kubernetes_ca_cert=
|
905
|
-
service_account_jwt=
|
701
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
702
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
906
703
|
disable_local_ca_jwt=False)
|
907
704
|
```
|
705
|
+
<!--End PulumiCodeChooser -->
|
908
706
|
|
909
707
|
## Import
|
910
708
|
|
@@ -930,25 +728,19 @@ class SecretBackend(pulumi.CustomResource):
|
|
930
728
|
resource_name: str,
|
931
729
|
opts: Optional[pulumi.ResourceOptions] = None,
|
932
730
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
933
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
934
731
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
935
732
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
936
733
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
937
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
938
734
|
description: Optional[pulumi.Input[str]] = None,
|
939
735
|
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
940
736
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
941
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
942
737
|
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
943
738
|
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
944
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
945
739
|
local: Optional[pulumi.Input[bool]] = None,
|
946
740
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
947
741
|
namespace: Optional[pulumi.Input[str]] = None,
|
948
742
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
949
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
950
743
|
path: Optional[pulumi.Input[str]] = None,
|
951
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
952
744
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
953
745
|
service_account_jwt: Optional[pulumi.Input[str]] = None,
|
954
746
|
__props__=None):
|
@@ -961,27 +753,21 @@ class SecretBackend(pulumi.CustomResource):
|
|
961
753
|
__props__ = SecretBackendArgs.__new__(SecretBackendArgs)
|
962
754
|
|
963
755
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
964
|
-
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
965
756
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
966
757
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
967
758
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
968
|
-
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
969
759
|
__props__.__dict__["description"] = description
|
970
760
|
__props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
|
971
761
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
972
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
973
762
|
__props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
|
974
763
|
__props__.__dict__["kubernetes_host"] = kubernetes_host
|
975
|
-
__props__.__dict__["listing_visibility"] = listing_visibility
|
976
764
|
__props__.__dict__["local"] = local
|
977
765
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
978
766
|
__props__.__dict__["namespace"] = namespace
|
979
767
|
__props__.__dict__["options"] = options
|
980
|
-
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
981
768
|
if path is None and not opts.urn:
|
982
769
|
raise TypeError("Missing required property 'path'")
|
983
770
|
__props__.__dict__["path"] = path
|
984
|
-
__props__.__dict__["plugin_version"] = plugin_version
|
985
771
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
986
772
|
__props__.__dict__["service_account_jwt"] = None if service_account_jwt is None else pulumi.Output.secret(service_account_jwt)
|
987
773
|
__props__.__dict__["accessor"] = None
|
@@ -999,25 +785,19 @@ class SecretBackend(pulumi.CustomResource):
|
|
999
785
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1000
786
|
accessor: Optional[pulumi.Input[str]] = None,
|
1001
787
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1002
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1003
788
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1004
789
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1005
790
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1006
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1007
791
|
description: Optional[pulumi.Input[str]] = None,
|
1008
792
|
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
1009
793
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1010
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1011
794
|
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
1012
795
|
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
1013
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1014
796
|
local: Optional[pulumi.Input[bool]] = None,
|
1015
797
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1016
798
|
namespace: Optional[pulumi.Input[str]] = None,
|
1017
799
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1018
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1019
800
|
path: Optional[pulumi.Input[str]] = None,
|
1020
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
1021
801
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
1022
802
|
service_account_jwt: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
|
1023
803
|
"""
|
@@ -1029,16 +809,13 @@ class SecretBackend(pulumi.CustomResource):
|
|
1029
809
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1030
810
|
:param pulumi.Input[str] accessor: Accessor of the mount
|
1031
811
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1032
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1033
812
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1034
813
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1035
814
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1036
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1037
815
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
1038
816
|
:param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
1039
817
|
service account JWT when Vault is running in a Kubernetes pod.
|
1040
818
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1041
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1042
819
|
:param pulumi.Input[str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
1043
820
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
1044
821
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
@@ -1046,7 +823,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1046
823
|
:param pulumi.Input[str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
1047
824
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
1048
825
|
are not set on the host that Vault is running on.
|
1049
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1050
826
|
:param pulumi.Input[bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1051
827
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1052
828
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -1054,9 +830,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1054
830
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1055
831
|
*Available only for Vault Enterprise*.
|
1056
832
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1057
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1058
833
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
1059
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1060
834
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1061
835
|
:param pulumi.Input[str] service_account_jwt: The JSON web token of the service account used by the
|
1062
836
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
@@ -1068,25 +842,19 @@ class SecretBackend(pulumi.CustomResource):
|
|
1068
842
|
|
1069
843
|
__props__.__dict__["accessor"] = accessor
|
1070
844
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1071
|
-
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1072
845
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1073
846
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1074
847
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1075
|
-
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1076
848
|
__props__.__dict__["description"] = description
|
1077
849
|
__props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
|
1078
850
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1079
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
1080
851
|
__props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
|
1081
852
|
__props__.__dict__["kubernetes_host"] = kubernetes_host
|
1082
|
-
__props__.__dict__["listing_visibility"] = listing_visibility
|
1083
853
|
__props__.__dict__["local"] = local
|
1084
854
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1085
855
|
__props__.__dict__["namespace"] = namespace
|
1086
856
|
__props__.__dict__["options"] = options
|
1087
|
-
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1088
857
|
__props__.__dict__["path"] = path
|
1089
|
-
__props__.__dict__["plugin_version"] = plugin_version
|
1090
858
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
1091
859
|
__props__.__dict__["service_account_jwt"] = service_account_jwt
|
1092
860
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
@@ -1107,14 +875,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1107
875
|
"""
|
1108
876
|
return pulumi.get(self, "allowed_managed_keys")
|
1109
877
|
|
1110
|
-
@property
|
1111
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
1112
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1113
|
-
"""
|
1114
|
-
List of headers to allow and pass from the request to the plugin
|
1115
|
-
"""
|
1116
|
-
return pulumi.get(self, "allowed_response_headers")
|
1117
|
-
|
1118
878
|
@property
|
1119
879
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1120
880
|
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
|
@@ -1139,14 +899,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1139
899
|
"""
|
1140
900
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1141
901
|
|
1142
|
-
@property
|
1143
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
1144
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1145
|
-
"""
|
1146
|
-
List of headers to allow and pass from the request to the plugin
|
1147
|
-
"""
|
1148
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
1149
|
-
|
1150
902
|
@property
|
1151
903
|
@pulumi.getter
|
1152
904
|
def description(self) -> pulumi.Output[Optional[str]]:
|
@@ -1172,14 +924,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1172
924
|
"""
|
1173
925
|
return pulumi.get(self, "external_entropy_access")
|
1174
926
|
|
1175
|
-
@property
|
1176
|
-
@pulumi.getter(name="identityTokenKey")
|
1177
|
-
def identity_token_key(self) -> pulumi.Output[Optional[str]]:
|
1178
|
-
"""
|
1179
|
-
The key to use for signing plugin workload identity tokens
|
1180
|
-
"""
|
1181
|
-
return pulumi.get(self, "identity_token_key")
|
1182
|
-
|
1183
927
|
@property
|
1184
928
|
@pulumi.getter(name="kubernetesCaCert")
|
1185
929
|
def kubernetes_ca_cert(self) -> pulumi.Output[Optional[str]]:
|
@@ -1201,14 +945,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1201
945
|
"""
|
1202
946
|
return pulumi.get(self, "kubernetes_host")
|
1203
947
|
|
1204
|
-
@property
|
1205
|
-
@pulumi.getter(name="listingVisibility")
|
1206
|
-
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1207
|
-
"""
|
1208
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
1209
|
-
"""
|
1210
|
-
return pulumi.get(self, "listing_visibility")
|
1211
|
-
|
1212
948
|
@property
|
1213
949
|
@pulumi.getter
|
1214
950
|
def local(self) -> pulumi.Output[Optional[bool]]:
|
@@ -1244,14 +980,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1244
980
|
"""
|
1245
981
|
return pulumi.get(self, "options")
|
1246
982
|
|
1247
|
-
@property
|
1248
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
1249
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1250
|
-
"""
|
1251
|
-
List of headers to allow and pass from the request to the plugin
|
1252
|
-
"""
|
1253
|
-
return pulumi.get(self, "passthrough_request_headers")
|
1254
|
-
|
1255
983
|
@property
|
1256
984
|
@pulumi.getter
|
1257
985
|
def path(self) -> pulumi.Output[str]:
|
@@ -1260,14 +988,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1260
988
|
"""
|
1261
989
|
return pulumi.get(self, "path")
|
1262
990
|
|
1263
|
-
@property
|
1264
|
-
@pulumi.getter(name="pluginVersion")
|
1265
|
-
def plugin_version(self) -> pulumi.Output[Optional[str]]:
|
1266
|
-
"""
|
1267
|
-
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1268
|
-
"""
|
1269
|
-
return pulumi.get(self, "plugin_version")
|
1270
|
-
|
1271
991
|
@property
|
1272
992
|
@pulumi.getter(name="sealWrap")
|
1273
993
|
def seal_wrap(self) -> pulumi.Output[bool]:
|