pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
pulumi_vault/mount.py
CHANGED
@@ -17,39 +17,26 @@ class MountArgs:
|
|
17
17
|
path: pulumi.Input[str],
|
18
18
|
type: pulumi.Input[str],
|
19
19
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
20
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
21
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
23
22
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
24
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
23
|
description: Optional[pulumi.Input[str]] = None,
|
26
24
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
27
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
28
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
29
25
|
local: Optional[pulumi.Input[bool]] = None,
|
30
26
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
31
27
|
namespace: Optional[pulumi.Input[str]] = None,
|
32
28
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
33
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
34
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
35
29
|
seal_wrap: Optional[pulumi.Input[bool]] = None):
|
36
30
|
"""
|
37
31
|
The set of arguments for constructing a Mount resource.
|
38
32
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
39
33
|
:param pulumi.Input[str] type: Type of the backend, such as "aws"
|
40
34
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
41
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
42
|
-
them in the response.
|
43
35
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
44
36
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
45
37
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
46
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
47
|
-
backend can request delegated authentication for.
|
48
38
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
49
39
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
50
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
51
|
-
not provided, this will default to Vault's OIDC default key.
|
52
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
53
40
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
54
41
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
55
42
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -57,35 +44,22 @@ class MountArgs:
|
|
57
44
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
58
45
|
*Available only for Vault Enterprise*.
|
59
46
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
60
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
61
|
-
the plugin.
|
62
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
63
|
-
If unspecified, the server will select any matching unversioned plugin that may have been
|
64
|
-
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
65
47
|
:param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
66
48
|
"""
|
67
49
|
pulumi.set(__self__, "path", path)
|
68
50
|
pulumi.set(__self__, "type", type)
|
69
51
|
if allowed_managed_keys is not None:
|
70
52
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
71
|
-
if allowed_response_headers is not None:
|
72
|
-
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
73
53
|
if audit_non_hmac_request_keys is not None:
|
74
54
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
75
55
|
if audit_non_hmac_response_keys is not None:
|
76
56
|
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
77
57
|
if default_lease_ttl_seconds is not None:
|
78
58
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
79
|
-
if delegated_auth_accessors is not None:
|
80
|
-
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
81
59
|
if description is not None:
|
82
60
|
pulumi.set(__self__, "description", description)
|
83
61
|
if external_entropy_access is not None:
|
84
62
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
85
|
-
if identity_token_key is not None:
|
86
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
87
|
-
if listing_visibility is not None:
|
88
|
-
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
89
63
|
if local is not None:
|
90
64
|
pulumi.set(__self__, "local", local)
|
91
65
|
if max_lease_ttl_seconds is not None:
|
@@ -94,10 +68,6 @@ class MountArgs:
|
|
94
68
|
pulumi.set(__self__, "namespace", namespace)
|
95
69
|
if options is not None:
|
96
70
|
pulumi.set(__self__, "options", options)
|
97
|
-
if passthrough_request_headers is not None:
|
98
|
-
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
99
|
-
if plugin_version is not None:
|
100
|
-
pulumi.set(__self__, "plugin_version", plugin_version)
|
101
71
|
if seal_wrap is not None:
|
102
72
|
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
103
73
|
|
@@ -137,19 +107,6 @@ class MountArgs:
|
|
137
107
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
138
108
|
pulumi.set(self, "allowed_managed_keys", value)
|
139
109
|
|
140
|
-
@property
|
141
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
142
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
143
|
-
"""
|
144
|
-
List of headers to allow, allowing a plugin to include
|
145
|
-
them in the response.
|
146
|
-
"""
|
147
|
-
return pulumi.get(self, "allowed_response_headers")
|
148
|
-
|
149
|
-
@allowed_response_headers.setter
|
150
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
151
|
-
pulumi.set(self, "allowed_response_headers", value)
|
152
|
-
|
153
110
|
@property
|
154
111
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
155
112
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -186,19 +143,6 @@ class MountArgs:
|
|
186
143
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
187
144
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
188
145
|
|
189
|
-
@property
|
190
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
191
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
192
|
-
"""
|
193
|
-
List of allowed authentication mount accessors the
|
194
|
-
backend can request delegated authentication for.
|
195
|
-
"""
|
196
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
197
|
-
|
198
|
-
@delegated_auth_accessors.setter
|
199
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
200
|
-
pulumi.set(self, "delegated_auth_accessors", value)
|
201
|
-
|
202
146
|
@property
|
203
147
|
@pulumi.getter
|
204
148
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -223,31 +167,6 @@ class MountArgs:
|
|
223
167
|
def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
|
224
168
|
pulumi.set(self, "external_entropy_access", value)
|
225
169
|
|
226
|
-
@property
|
227
|
-
@pulumi.getter(name="identityTokenKey")
|
228
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
229
|
-
"""
|
230
|
-
The key to use for signing plugin workload identity tokens. If
|
231
|
-
not provided, this will default to Vault's OIDC default key.
|
232
|
-
"""
|
233
|
-
return pulumi.get(self, "identity_token_key")
|
234
|
-
|
235
|
-
@identity_token_key.setter
|
236
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
237
|
-
pulumi.set(self, "identity_token_key", value)
|
238
|
-
|
239
|
-
@property
|
240
|
-
@pulumi.getter(name="listingVisibility")
|
241
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
242
|
-
"""
|
243
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
244
|
-
"""
|
245
|
-
return pulumi.get(self, "listing_visibility")
|
246
|
-
|
247
|
-
@listing_visibility.setter
|
248
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
249
|
-
pulumi.set(self, "listing_visibility", value)
|
250
|
-
|
251
170
|
@property
|
252
171
|
@pulumi.getter
|
253
172
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -299,33 +218,6 @@ class MountArgs:
|
|
299
218
|
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
300
219
|
pulumi.set(self, "options", value)
|
301
220
|
|
302
|
-
@property
|
303
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
304
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
305
|
-
"""
|
306
|
-
List of headers to allow and pass from the request to
|
307
|
-
the plugin.
|
308
|
-
"""
|
309
|
-
return pulumi.get(self, "passthrough_request_headers")
|
310
|
-
|
311
|
-
@passthrough_request_headers.setter
|
312
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
313
|
-
pulumi.set(self, "passthrough_request_headers", value)
|
314
|
-
|
315
|
-
@property
|
316
|
-
@pulumi.getter(name="pluginVersion")
|
317
|
-
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
318
|
-
"""
|
319
|
-
Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
320
|
-
If unspecified, the server will select any matching unversioned plugin that may have been
|
321
|
-
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
322
|
-
"""
|
323
|
-
return pulumi.get(self, "plugin_version")
|
324
|
-
|
325
|
-
@plugin_version.setter
|
326
|
-
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
327
|
-
pulumi.set(self, "plugin_version", value)
|
328
|
-
|
329
221
|
@property
|
330
222
|
@pulumi.getter(name="sealWrap")
|
331
223
|
def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
|
@@ -344,40 +236,27 @@ class _MountState:
|
|
344
236
|
def __init__(__self__, *,
|
345
237
|
accessor: Optional[pulumi.Input[str]] = None,
|
346
238
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
347
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
348
239
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
349
240
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
350
241
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
351
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
352
242
|
description: Optional[pulumi.Input[str]] = None,
|
353
243
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
354
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
355
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
356
244
|
local: Optional[pulumi.Input[bool]] = None,
|
357
245
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
358
246
|
namespace: Optional[pulumi.Input[str]] = None,
|
359
247
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
360
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
361
248
|
path: Optional[pulumi.Input[str]] = None,
|
362
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
363
249
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
364
250
|
type: Optional[pulumi.Input[str]] = None):
|
365
251
|
"""
|
366
252
|
Input properties used for looking up and filtering Mount resources.
|
367
253
|
:param pulumi.Input[str] accessor: The accessor for this mount.
|
368
254
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
369
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
370
|
-
them in the response.
|
371
255
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
372
256
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
373
257
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
374
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
375
|
-
backend can request delegated authentication for.
|
376
258
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
377
259
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
378
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
379
|
-
not provided, this will default to Vault's OIDC default key.
|
380
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
381
260
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
382
261
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
383
262
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -385,12 +264,7 @@ class _MountState:
|
|
385
264
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
386
265
|
*Available only for Vault Enterprise*.
|
387
266
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
388
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
389
|
-
the plugin.
|
390
267
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
391
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
392
|
-
If unspecified, the server will select any matching unversioned plugin that may have been
|
393
|
-
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
394
268
|
:param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
395
269
|
:param pulumi.Input[str] type: Type of the backend, such as "aws"
|
396
270
|
"""
|
@@ -398,24 +272,16 @@ class _MountState:
|
|
398
272
|
pulumi.set(__self__, "accessor", accessor)
|
399
273
|
if allowed_managed_keys is not None:
|
400
274
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
401
|
-
if allowed_response_headers is not None:
|
402
|
-
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
403
275
|
if audit_non_hmac_request_keys is not None:
|
404
276
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
405
277
|
if audit_non_hmac_response_keys is not None:
|
406
278
|
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
407
279
|
if default_lease_ttl_seconds is not None:
|
408
280
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
409
|
-
if delegated_auth_accessors is not None:
|
410
|
-
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
411
281
|
if description is not None:
|
412
282
|
pulumi.set(__self__, "description", description)
|
413
283
|
if external_entropy_access is not None:
|
414
284
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
415
|
-
if identity_token_key is not None:
|
416
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
417
|
-
if listing_visibility is not None:
|
418
|
-
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
419
285
|
if local is not None:
|
420
286
|
pulumi.set(__self__, "local", local)
|
421
287
|
if max_lease_ttl_seconds is not None:
|
@@ -424,12 +290,8 @@ class _MountState:
|
|
424
290
|
pulumi.set(__self__, "namespace", namespace)
|
425
291
|
if options is not None:
|
426
292
|
pulumi.set(__self__, "options", options)
|
427
|
-
if passthrough_request_headers is not None:
|
428
|
-
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
429
293
|
if path is not None:
|
430
294
|
pulumi.set(__self__, "path", path)
|
431
|
-
if plugin_version is not None:
|
432
|
-
pulumi.set(__self__, "plugin_version", plugin_version)
|
433
295
|
if seal_wrap is not None:
|
434
296
|
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
435
297
|
if type is not None:
|
@@ -459,19 +321,6 @@ class _MountState:
|
|
459
321
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
460
322
|
pulumi.set(self, "allowed_managed_keys", value)
|
461
323
|
|
462
|
-
@property
|
463
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
464
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
465
|
-
"""
|
466
|
-
List of headers to allow, allowing a plugin to include
|
467
|
-
them in the response.
|
468
|
-
"""
|
469
|
-
return pulumi.get(self, "allowed_response_headers")
|
470
|
-
|
471
|
-
@allowed_response_headers.setter
|
472
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
473
|
-
pulumi.set(self, "allowed_response_headers", value)
|
474
|
-
|
475
324
|
@property
|
476
325
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
477
326
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -508,19 +357,6 @@ class _MountState:
|
|
508
357
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
509
358
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
510
359
|
|
511
|
-
@property
|
512
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
513
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
514
|
-
"""
|
515
|
-
List of allowed authentication mount accessors the
|
516
|
-
backend can request delegated authentication for.
|
517
|
-
"""
|
518
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
519
|
-
|
520
|
-
@delegated_auth_accessors.setter
|
521
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
522
|
-
pulumi.set(self, "delegated_auth_accessors", value)
|
523
|
-
|
524
360
|
@property
|
525
361
|
@pulumi.getter
|
526
362
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -545,31 +381,6 @@ class _MountState:
|
|
545
381
|
def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
|
546
382
|
pulumi.set(self, "external_entropy_access", value)
|
547
383
|
|
548
|
-
@property
|
549
|
-
@pulumi.getter(name="identityTokenKey")
|
550
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
551
|
-
"""
|
552
|
-
The key to use for signing plugin workload identity tokens. If
|
553
|
-
not provided, this will default to Vault's OIDC default key.
|
554
|
-
"""
|
555
|
-
return pulumi.get(self, "identity_token_key")
|
556
|
-
|
557
|
-
@identity_token_key.setter
|
558
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
559
|
-
pulumi.set(self, "identity_token_key", value)
|
560
|
-
|
561
|
-
@property
|
562
|
-
@pulumi.getter(name="listingVisibility")
|
563
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
564
|
-
"""
|
565
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
566
|
-
"""
|
567
|
-
return pulumi.get(self, "listing_visibility")
|
568
|
-
|
569
|
-
@listing_visibility.setter
|
570
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
571
|
-
pulumi.set(self, "listing_visibility", value)
|
572
|
-
|
573
384
|
@property
|
574
385
|
@pulumi.getter
|
575
386
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -621,19 +432,6 @@ class _MountState:
|
|
621
432
|
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
622
433
|
pulumi.set(self, "options", value)
|
623
434
|
|
624
|
-
@property
|
625
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
626
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
627
|
-
"""
|
628
|
-
List of headers to allow and pass from the request to
|
629
|
-
the plugin.
|
630
|
-
"""
|
631
|
-
return pulumi.get(self, "passthrough_request_headers")
|
632
|
-
|
633
|
-
@passthrough_request_headers.setter
|
634
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
635
|
-
pulumi.set(self, "passthrough_request_headers", value)
|
636
|
-
|
637
435
|
@property
|
638
436
|
@pulumi.getter
|
639
437
|
def path(self) -> Optional[pulumi.Input[str]]:
|
@@ -646,20 +444,6 @@ class _MountState:
|
|
646
444
|
def path(self, value: Optional[pulumi.Input[str]]):
|
647
445
|
pulumi.set(self, "path", value)
|
648
446
|
|
649
|
-
@property
|
650
|
-
@pulumi.getter(name="pluginVersion")
|
651
|
-
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
652
|
-
"""
|
653
|
-
Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
654
|
-
If unspecified, the server will select any matching unversioned plugin that may have been
|
655
|
-
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
656
|
-
"""
|
657
|
-
return pulumi.get(self, "plugin_version")
|
658
|
-
|
659
|
-
@plugin_version.setter
|
660
|
-
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
661
|
-
pulumi.set(self, "plugin_version", value)
|
662
|
-
|
663
447
|
@property
|
664
448
|
@pulumi.getter(name="sealWrap")
|
665
449
|
def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
|
@@ -691,22 +475,16 @@ class Mount(pulumi.CustomResource):
|
|
691
475
|
resource_name: str,
|
692
476
|
opts: Optional[pulumi.ResourceOptions] = None,
|
693
477
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
694
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
695
478
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
696
479
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
697
480
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
698
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
699
481
|
description: Optional[pulumi.Input[str]] = None,
|
700
482
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
701
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
702
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
703
483
|
local: Optional[pulumi.Input[bool]] = None,
|
704
484
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
705
485
|
namespace: Optional[pulumi.Input[str]] = None,
|
706
486
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
707
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
708
487
|
path: Optional[pulumi.Input[str]] = None,
|
709
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
710
488
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
711
489
|
type: Optional[pulumi.Input[str]] = None,
|
712
490
|
__props__=None):
|
@@ -715,54 +493,62 @@ class Mount(pulumi.CustomResource):
|
|
715
493
|
|
716
494
|
## Example Usage
|
717
495
|
|
496
|
+
<!--Start PulumiCodeChooser -->
|
718
497
|
```python
|
719
498
|
import pulumi
|
720
499
|
import pulumi_vault as vault
|
721
500
|
|
722
501
|
example = vault.Mount("example",
|
502
|
+
description="This is an example mount",
|
723
503
|
path="dummy",
|
724
|
-
type="generic"
|
725
|
-
description="This is an example mount")
|
504
|
+
type="generic")
|
726
505
|
```
|
506
|
+
<!--End PulumiCodeChooser -->
|
727
507
|
|
508
|
+
<!--Start PulumiCodeChooser -->
|
728
509
|
```python
|
729
510
|
import pulumi
|
730
511
|
import pulumi_vault as vault
|
731
512
|
|
732
513
|
kvv2_example = vault.Mount("kvv2-example",
|
733
|
-
|
734
|
-
type="kv-v2",
|
514
|
+
description="This is an example KV Version 2 secret engine mount",
|
735
515
|
options={
|
736
|
-
"version": "2",
|
737
516
|
"type": "kv-v2",
|
517
|
+
"version": "2",
|
738
518
|
},
|
739
|
-
|
519
|
+
path="version2-example",
|
520
|
+
type="kv-v2")
|
740
521
|
```
|
522
|
+
<!--End PulumiCodeChooser -->
|
741
523
|
|
524
|
+
<!--Start PulumiCodeChooser -->
|
742
525
|
```python
|
743
526
|
import pulumi
|
744
527
|
import pulumi_vault as vault
|
745
528
|
|
746
529
|
transit_example = vault.Mount("transit-example",
|
747
|
-
path="transit-example",
|
748
|
-
type="transit",
|
749
530
|
description="This is an example transit secret engine mount",
|
750
531
|
options={
|
751
532
|
"convergent_encryption": False,
|
752
|
-
}
|
533
|
+
},
|
534
|
+
path="transit-example",
|
535
|
+
type="transit")
|
753
536
|
```
|
537
|
+
<!--End PulumiCodeChooser -->
|
754
538
|
|
539
|
+
<!--Start PulumiCodeChooser -->
|
755
540
|
```python
|
756
541
|
import pulumi
|
757
542
|
import pulumi_vault as vault
|
758
543
|
|
759
544
|
pki_example = vault.Mount("pki-example",
|
760
|
-
path="pki-example",
|
761
|
-
type="pki",
|
762
|
-
description="This is an example PKI mount",
|
763
545
|
default_lease_ttl_seconds=3600,
|
764
|
-
|
546
|
+
description="This is an example PKI mount",
|
547
|
+
max_lease_ttl_seconds=86400,
|
548
|
+
path="pki-example",
|
549
|
+
type="pki")
|
765
550
|
```
|
551
|
+
<!--End PulumiCodeChooser -->
|
766
552
|
|
767
553
|
## Import
|
768
554
|
|
@@ -775,18 +561,11 @@ class Mount(pulumi.CustomResource):
|
|
775
561
|
:param str resource_name: The name of the resource.
|
776
562
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
777
563
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
778
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
779
|
-
them in the response.
|
780
564
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
781
565
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
782
566
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
783
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
784
|
-
backend can request delegated authentication for.
|
785
567
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
786
568
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
787
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
788
|
-
not provided, this will default to Vault's OIDC default key.
|
789
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
790
569
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
791
570
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
792
571
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -794,12 +573,7 @@ class Mount(pulumi.CustomResource):
|
|
794
573
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
795
574
|
*Available only for Vault Enterprise*.
|
796
575
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
797
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
798
|
-
the plugin.
|
799
576
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
800
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
801
|
-
If unspecified, the server will select any matching unversioned plugin that may have been
|
802
|
-
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
803
577
|
:param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
804
578
|
:param pulumi.Input[str] type: Type of the backend, such as "aws"
|
805
579
|
"""
|
@@ -814,54 +588,62 @@ class Mount(pulumi.CustomResource):
|
|
814
588
|
|
815
589
|
## Example Usage
|
816
590
|
|
591
|
+
<!--Start PulumiCodeChooser -->
|
817
592
|
```python
|
818
593
|
import pulumi
|
819
594
|
import pulumi_vault as vault
|
820
595
|
|
821
596
|
example = vault.Mount("example",
|
597
|
+
description="This is an example mount",
|
822
598
|
path="dummy",
|
823
|
-
type="generic"
|
824
|
-
description="This is an example mount")
|
599
|
+
type="generic")
|
825
600
|
```
|
601
|
+
<!--End PulumiCodeChooser -->
|
826
602
|
|
603
|
+
<!--Start PulumiCodeChooser -->
|
827
604
|
```python
|
828
605
|
import pulumi
|
829
606
|
import pulumi_vault as vault
|
830
607
|
|
831
608
|
kvv2_example = vault.Mount("kvv2-example",
|
832
|
-
|
833
|
-
type="kv-v2",
|
609
|
+
description="This is an example KV Version 2 secret engine mount",
|
834
610
|
options={
|
835
|
-
"version": "2",
|
836
611
|
"type": "kv-v2",
|
612
|
+
"version": "2",
|
837
613
|
},
|
838
|
-
|
614
|
+
path="version2-example",
|
615
|
+
type="kv-v2")
|
839
616
|
```
|
617
|
+
<!--End PulumiCodeChooser -->
|
840
618
|
|
619
|
+
<!--Start PulumiCodeChooser -->
|
841
620
|
```python
|
842
621
|
import pulumi
|
843
622
|
import pulumi_vault as vault
|
844
623
|
|
845
624
|
transit_example = vault.Mount("transit-example",
|
846
|
-
path="transit-example",
|
847
|
-
type="transit",
|
848
625
|
description="This is an example transit secret engine mount",
|
849
626
|
options={
|
850
627
|
"convergent_encryption": False,
|
851
|
-
}
|
628
|
+
},
|
629
|
+
path="transit-example",
|
630
|
+
type="transit")
|
852
631
|
```
|
632
|
+
<!--End PulumiCodeChooser -->
|
853
633
|
|
634
|
+
<!--Start PulumiCodeChooser -->
|
854
635
|
```python
|
855
636
|
import pulumi
|
856
637
|
import pulumi_vault as vault
|
857
638
|
|
858
639
|
pki_example = vault.Mount("pki-example",
|
859
|
-
path="pki-example",
|
860
|
-
type="pki",
|
861
|
-
description="This is an example PKI mount",
|
862
640
|
default_lease_ttl_seconds=3600,
|
863
|
-
|
641
|
+
description="This is an example PKI mount",
|
642
|
+
max_lease_ttl_seconds=86400,
|
643
|
+
path="pki-example",
|
644
|
+
type="pki")
|
864
645
|
```
|
646
|
+
<!--End PulumiCodeChooser -->
|
865
647
|
|
866
648
|
## Import
|
867
649
|
|
@@ -887,22 +669,16 @@ class Mount(pulumi.CustomResource):
|
|
887
669
|
resource_name: str,
|
888
670
|
opts: Optional[pulumi.ResourceOptions] = None,
|
889
671
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
890
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
891
672
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
892
673
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
893
674
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
894
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
895
675
|
description: Optional[pulumi.Input[str]] = None,
|
896
676
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
897
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
898
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
899
677
|
local: Optional[pulumi.Input[bool]] = None,
|
900
678
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
901
679
|
namespace: Optional[pulumi.Input[str]] = None,
|
902
680
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
903
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
904
681
|
path: Optional[pulumi.Input[str]] = None,
|
905
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
906
682
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
907
683
|
type: Optional[pulumi.Input[str]] = None,
|
908
684
|
__props__=None):
|
@@ -915,24 +691,18 @@ class Mount(pulumi.CustomResource):
|
|
915
691
|
__props__ = MountArgs.__new__(MountArgs)
|
916
692
|
|
917
693
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
918
|
-
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
919
694
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
920
695
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
921
696
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
922
|
-
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
923
697
|
__props__.__dict__["description"] = description
|
924
698
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
925
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
926
|
-
__props__.__dict__["listing_visibility"] = listing_visibility
|
927
699
|
__props__.__dict__["local"] = local
|
928
700
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
929
701
|
__props__.__dict__["namespace"] = namespace
|
930
702
|
__props__.__dict__["options"] = options
|
931
|
-
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
932
703
|
if path is None and not opts.urn:
|
933
704
|
raise TypeError("Missing required property 'path'")
|
934
705
|
__props__.__dict__["path"] = path
|
935
|
-
__props__.__dict__["plugin_version"] = plugin_version
|
936
706
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
937
707
|
if type is None and not opts.urn:
|
938
708
|
raise TypeError("Missing required property 'type'")
|
@@ -950,22 +720,16 @@ class Mount(pulumi.CustomResource):
|
|
950
720
|
opts: Optional[pulumi.ResourceOptions] = None,
|
951
721
|
accessor: Optional[pulumi.Input[str]] = None,
|
952
722
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
953
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
954
723
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
955
724
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
956
725
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
957
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
958
726
|
description: Optional[pulumi.Input[str]] = None,
|
959
727
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
960
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
961
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
962
728
|
local: Optional[pulumi.Input[bool]] = None,
|
963
729
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
964
730
|
namespace: Optional[pulumi.Input[str]] = None,
|
965
731
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
966
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
967
732
|
path: Optional[pulumi.Input[str]] = None,
|
968
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
969
733
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
970
734
|
type: Optional[pulumi.Input[str]] = None) -> 'Mount':
|
971
735
|
"""
|
@@ -977,18 +741,11 @@ class Mount(pulumi.CustomResource):
|
|
977
741
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
978
742
|
:param pulumi.Input[str] accessor: The accessor for this mount.
|
979
743
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
980
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
981
|
-
them in the response.
|
982
744
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
983
745
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
984
746
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
985
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
986
|
-
backend can request delegated authentication for.
|
987
747
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
988
748
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
989
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
990
|
-
not provided, this will default to Vault's OIDC default key.
|
991
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
992
749
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
993
750
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
994
751
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -996,12 +753,7 @@ class Mount(pulumi.CustomResource):
|
|
996
753
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
997
754
|
*Available only for Vault Enterprise*.
|
998
755
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
999
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
1000
|
-
the plugin.
|
1001
756
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
1002
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
1003
|
-
If unspecified, the server will select any matching unversioned plugin that may have been
|
1004
|
-
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
1005
757
|
:param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1006
758
|
:param pulumi.Input[str] type: Type of the backend, such as "aws"
|
1007
759
|
"""
|
@@ -1011,22 +763,16 @@ class Mount(pulumi.CustomResource):
|
|
1011
763
|
|
1012
764
|
__props__.__dict__["accessor"] = accessor
|
1013
765
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1014
|
-
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1015
766
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1016
767
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1017
768
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1018
|
-
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1019
769
|
__props__.__dict__["description"] = description
|
1020
770
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1021
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
1022
|
-
__props__.__dict__["listing_visibility"] = listing_visibility
|
1023
771
|
__props__.__dict__["local"] = local
|
1024
772
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1025
773
|
__props__.__dict__["namespace"] = namespace
|
1026
774
|
__props__.__dict__["options"] = options
|
1027
|
-
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1028
775
|
__props__.__dict__["path"] = path
|
1029
|
-
__props__.__dict__["plugin_version"] = plugin_version
|
1030
776
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
1031
777
|
__props__.__dict__["type"] = type
|
1032
778
|
return Mount(resource_name, opts=opts, __props__=__props__)
|
@@ -1047,15 +793,6 @@ class Mount(pulumi.CustomResource):
|
|
1047
793
|
"""
|
1048
794
|
return pulumi.get(self, "allowed_managed_keys")
|
1049
795
|
|
1050
|
-
@property
|
1051
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
1052
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1053
|
-
"""
|
1054
|
-
List of headers to allow, allowing a plugin to include
|
1055
|
-
them in the response.
|
1056
|
-
"""
|
1057
|
-
return pulumi.get(self, "allowed_response_headers")
|
1058
|
-
|
1059
796
|
@property
|
1060
797
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1061
798
|
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
|
@@ -1080,15 +817,6 @@ class Mount(pulumi.CustomResource):
|
|
1080
817
|
"""
|
1081
818
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1082
819
|
|
1083
|
-
@property
|
1084
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
1085
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1086
|
-
"""
|
1087
|
-
List of allowed authentication mount accessors the
|
1088
|
-
backend can request delegated authentication for.
|
1089
|
-
"""
|
1090
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
1091
|
-
|
1092
820
|
@property
|
1093
821
|
@pulumi.getter
|
1094
822
|
def description(self) -> pulumi.Output[Optional[str]]:
|
@@ -1105,23 +833,6 @@ class Mount(pulumi.CustomResource):
|
|
1105
833
|
"""
|
1106
834
|
return pulumi.get(self, "external_entropy_access")
|
1107
835
|
|
1108
|
-
@property
|
1109
|
-
@pulumi.getter(name="identityTokenKey")
|
1110
|
-
def identity_token_key(self) -> pulumi.Output[Optional[str]]:
|
1111
|
-
"""
|
1112
|
-
The key to use for signing plugin workload identity tokens. If
|
1113
|
-
not provided, this will default to Vault's OIDC default key.
|
1114
|
-
"""
|
1115
|
-
return pulumi.get(self, "identity_token_key")
|
1116
|
-
|
1117
|
-
@property
|
1118
|
-
@pulumi.getter(name="listingVisibility")
|
1119
|
-
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1120
|
-
"""
|
1121
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
1122
|
-
"""
|
1123
|
-
return pulumi.get(self, "listing_visibility")
|
1124
|
-
|
1125
836
|
@property
|
1126
837
|
@pulumi.getter
|
1127
838
|
def local(self) -> pulumi.Output[Optional[bool]]:
|
@@ -1157,15 +868,6 @@ class Mount(pulumi.CustomResource):
|
|
1157
868
|
"""
|
1158
869
|
return pulumi.get(self, "options")
|
1159
870
|
|
1160
|
-
@property
|
1161
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
1162
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1163
|
-
"""
|
1164
|
-
List of headers to allow and pass from the request to
|
1165
|
-
the plugin.
|
1166
|
-
"""
|
1167
|
-
return pulumi.get(self, "passthrough_request_headers")
|
1168
|
-
|
1169
871
|
@property
|
1170
872
|
@pulumi.getter
|
1171
873
|
def path(self) -> pulumi.Output[str]:
|
@@ -1174,16 +876,6 @@ class Mount(pulumi.CustomResource):
|
|
1174
876
|
"""
|
1175
877
|
return pulumi.get(self, "path")
|
1176
878
|
|
1177
|
-
@property
|
1178
|
-
@pulumi.getter(name="pluginVersion")
|
1179
|
-
def plugin_version(self) -> pulumi.Output[Optional[str]]:
|
1180
|
-
"""
|
1181
|
-
Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
1182
|
-
If unspecified, the server will select any matching unversioned plugin that may have been
|
1183
|
-
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
1184
|
-
"""
|
1185
|
-
return pulumi.get(self, "plugin_version")
|
1186
|
-
|
1187
879
|
@property
|
1188
880
|
@pulumi.getter(name="sealWrap")
|
1189
881
|
def seal_wrap(self) -> pulumi.Output[bool]:
|