pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +120 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +37 -7
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +35 -23
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
pulumi_vault/managed/_inputs.py
CHANGED
@@ -4,17 +4,88 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'KeysAwArgs',
|
19
|
+
'KeysAwArgsDict',
|
14
20
|
'KeysAzureArgs',
|
21
|
+
'KeysAzureArgsDict',
|
15
22
|
'KeysPkcArgs',
|
23
|
+
'KeysPkcArgsDict',
|
16
24
|
]
|
17
25
|
|
26
|
+
MYPY = False
|
27
|
+
|
28
|
+
if not MYPY:
|
29
|
+
class KeysAwArgsDict(TypedDict):
|
30
|
+
access_key: pulumi.Input[str]
|
31
|
+
"""
|
32
|
+
The AWS access key to use
|
33
|
+
"""
|
34
|
+
key_bits: pulumi.Input[str]
|
35
|
+
"""
|
36
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
37
|
+
"""
|
38
|
+
key_type: pulumi.Input[str]
|
39
|
+
"""
|
40
|
+
The type of key to use
|
41
|
+
"""
|
42
|
+
kms_key: pulumi.Input[str]
|
43
|
+
"""
|
44
|
+
An identifier for the key
|
45
|
+
"""
|
46
|
+
name: pulumi.Input[str]
|
47
|
+
"""
|
48
|
+
A unique lowercase name that serves as identifying the key
|
49
|
+
"""
|
50
|
+
secret_key: pulumi.Input[str]
|
51
|
+
"""
|
52
|
+
The AWS secret key to use
|
53
|
+
"""
|
54
|
+
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
55
|
+
"""
|
56
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
57
|
+
"""
|
58
|
+
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
59
|
+
"""
|
60
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
61
|
+
"""
|
62
|
+
allow_store_key: NotRequired[pulumi.Input[bool]]
|
63
|
+
"""
|
64
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
65
|
+
"""
|
66
|
+
any_mount: NotRequired[pulumi.Input[bool]]
|
67
|
+
"""
|
68
|
+
Allow usage from any mount point within the namespace if 'true'
|
69
|
+
"""
|
70
|
+
curve: NotRequired[pulumi.Input[str]]
|
71
|
+
"""
|
72
|
+
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
73
|
+
"""
|
74
|
+
endpoint: NotRequired[pulumi.Input[str]]
|
75
|
+
"""
|
76
|
+
Used to specify a custom AWS endpoint
|
77
|
+
"""
|
78
|
+
region: NotRequired[pulumi.Input[str]]
|
79
|
+
"""
|
80
|
+
The AWS region where the keys are stored (or will be stored)
|
81
|
+
"""
|
82
|
+
uuid: NotRequired[pulumi.Input[str]]
|
83
|
+
"""
|
84
|
+
ID of the managed key read from Vault
|
85
|
+
"""
|
86
|
+
elif False:
|
87
|
+
KeysAwArgsDict: TypeAlias = Mapping[str, Any]
|
88
|
+
|
18
89
|
@pulumi.input_type
|
19
90
|
class KeysAwArgs:
|
20
91
|
def __init__(__self__, *,
|
@@ -240,6 +311,71 @@ class KeysAwArgs:
|
|
240
311
|
pulumi.set(self, "uuid", value)
|
241
312
|
|
242
313
|
|
314
|
+
if not MYPY:
|
315
|
+
class KeysAzureArgsDict(TypedDict):
|
316
|
+
client_id: pulumi.Input[str]
|
317
|
+
"""
|
318
|
+
The client id for credentials to query the Azure APIs
|
319
|
+
"""
|
320
|
+
client_secret: pulumi.Input[str]
|
321
|
+
"""
|
322
|
+
The client secret for credentials to query the Azure APIs
|
323
|
+
"""
|
324
|
+
key_name: pulumi.Input[str]
|
325
|
+
"""
|
326
|
+
The Key Vault key to use for encryption and decryption
|
327
|
+
"""
|
328
|
+
key_type: pulumi.Input[str]
|
329
|
+
"""
|
330
|
+
The type of key to use
|
331
|
+
"""
|
332
|
+
name: pulumi.Input[str]
|
333
|
+
"""
|
334
|
+
A unique lowercase name that serves as identifying the key
|
335
|
+
"""
|
336
|
+
tenant_id: pulumi.Input[str]
|
337
|
+
"""
|
338
|
+
The tenant id for the Azure Active Directory organization
|
339
|
+
"""
|
340
|
+
vault_name: pulumi.Input[str]
|
341
|
+
"""
|
342
|
+
The Key Vault vault to use the encryption keys for encryption and decryption
|
343
|
+
"""
|
344
|
+
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
345
|
+
"""
|
346
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
347
|
+
"""
|
348
|
+
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
349
|
+
"""
|
350
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
351
|
+
"""
|
352
|
+
allow_store_key: NotRequired[pulumi.Input[bool]]
|
353
|
+
"""
|
354
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
355
|
+
"""
|
356
|
+
any_mount: NotRequired[pulumi.Input[bool]]
|
357
|
+
"""
|
358
|
+
Allow usage from any mount point within the namespace if 'true'
|
359
|
+
"""
|
360
|
+
environment: NotRequired[pulumi.Input[str]]
|
361
|
+
"""
|
362
|
+
The Azure Cloud environment API endpoints to use
|
363
|
+
"""
|
364
|
+
key_bits: NotRequired[pulumi.Input[str]]
|
365
|
+
"""
|
366
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
367
|
+
"""
|
368
|
+
resource: NotRequired[pulumi.Input[str]]
|
369
|
+
"""
|
370
|
+
The Azure Key Vault resource's DNS Suffix to connect to
|
371
|
+
"""
|
372
|
+
uuid: NotRequired[pulumi.Input[str]]
|
373
|
+
"""
|
374
|
+
ID of the managed key read from Vault
|
375
|
+
"""
|
376
|
+
elif False:
|
377
|
+
KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
|
378
|
+
|
243
379
|
@pulumi.input_type
|
244
380
|
class KeysAzureArgs:
|
245
381
|
def __init__(__self__, *,
|
@@ -480,6 +616,75 @@ class KeysAzureArgs:
|
|
480
616
|
pulumi.set(self, "uuid", value)
|
481
617
|
|
482
618
|
|
619
|
+
if not MYPY:
|
620
|
+
class KeysPkcArgsDict(TypedDict):
|
621
|
+
key_id: pulumi.Input[str]
|
622
|
+
"""
|
623
|
+
The id of a PKCS#11 key to use
|
624
|
+
"""
|
625
|
+
key_label: pulumi.Input[str]
|
626
|
+
"""
|
627
|
+
The label of the key to use
|
628
|
+
"""
|
629
|
+
library: pulumi.Input[str]
|
630
|
+
"""
|
631
|
+
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
632
|
+
"""
|
633
|
+
mechanism: pulumi.Input[str]
|
634
|
+
"""
|
635
|
+
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
636
|
+
"""
|
637
|
+
name: pulumi.Input[str]
|
638
|
+
"""
|
639
|
+
A unique lowercase name that serves as identifying the key
|
640
|
+
"""
|
641
|
+
pin: pulumi.Input[str]
|
642
|
+
"""
|
643
|
+
The PIN for login
|
644
|
+
"""
|
645
|
+
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
646
|
+
"""
|
647
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
648
|
+
"""
|
649
|
+
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
650
|
+
"""
|
651
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
652
|
+
"""
|
653
|
+
allow_store_key: NotRequired[pulumi.Input[bool]]
|
654
|
+
"""
|
655
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
656
|
+
"""
|
657
|
+
any_mount: NotRequired[pulumi.Input[bool]]
|
658
|
+
"""
|
659
|
+
Allow usage from any mount point within the namespace if 'true'
|
660
|
+
"""
|
661
|
+
curve: NotRequired[pulumi.Input[str]]
|
662
|
+
"""
|
663
|
+
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
664
|
+
"""
|
665
|
+
force_rw_session: NotRequired[pulumi.Input[str]]
|
666
|
+
"""
|
667
|
+
Force all operations to open up a read-write session to the HSM
|
668
|
+
"""
|
669
|
+
key_bits: NotRequired[pulumi.Input[str]]
|
670
|
+
"""
|
671
|
+
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
672
|
+
"""
|
673
|
+
slot: NotRequired[pulumi.Input[str]]
|
674
|
+
"""
|
675
|
+
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
676
|
+
"""
|
677
|
+
token_label: NotRequired[pulumi.Input[str]]
|
678
|
+
"""
|
679
|
+
The slot token label to use
|
680
|
+
"""
|
681
|
+
uuid: NotRequired[pulumi.Input[str]]
|
682
|
+
"""
|
683
|
+
ID of the managed key read from Vault
|
684
|
+
"""
|
685
|
+
elif False:
|
686
|
+
KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
|
687
|
+
|
483
688
|
@pulumi.input_type
|
484
689
|
class KeysPkcArgs:
|
485
690
|
def __init__(__self__, *,
|
pulumi_vault/managed/keys.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -162,10 +167,10 @@ class Keys(pulumi.CustomResource):
|
|
162
167
|
def __init__(__self__,
|
163
168
|
resource_name: str,
|
164
169
|
opts: Optional[pulumi.ResourceOptions] = None,
|
165
|
-
aws: Optional[pulumi.Input[Sequence[pulumi.Input[
|
166
|
-
azures: Optional[pulumi.Input[Sequence[pulumi.Input[
|
170
|
+
aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
|
171
|
+
azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
|
167
172
|
namespace: Optional[pulumi.Input[str]] = None,
|
168
|
-
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
173
|
+
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None,
|
169
174
|
__props__=None):
|
170
175
|
"""
|
171
176
|
A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
|
@@ -182,10 +187,10 @@ class Keys(pulumi.CustomResource):
|
|
182
187
|
|
183
188
|
:param str resource_name: The name of the resource.
|
184
189
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
185
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
186
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
190
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]] aws: Configuration block for AWS Managed Keys
|
191
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]] azures: Configuration block for Azure Managed Keys
|
187
192
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
188
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
193
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]] pkcs: Configuration block for PKCS Managed Keys
|
189
194
|
"""
|
190
195
|
...
|
191
196
|
@overload
|
@@ -221,10 +226,10 @@ class Keys(pulumi.CustomResource):
|
|
221
226
|
def _internal_init(__self__,
|
222
227
|
resource_name: str,
|
223
228
|
opts: Optional[pulumi.ResourceOptions] = None,
|
224
|
-
aws: Optional[pulumi.Input[Sequence[pulumi.Input[
|
225
|
-
azures: Optional[pulumi.Input[Sequence[pulumi.Input[
|
229
|
+
aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
|
230
|
+
azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
|
226
231
|
namespace: Optional[pulumi.Input[str]] = None,
|
227
|
-
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
232
|
+
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None,
|
228
233
|
__props__=None):
|
229
234
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
230
235
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -248,10 +253,10 @@ class Keys(pulumi.CustomResource):
|
|
248
253
|
def get(resource_name: str,
|
249
254
|
id: pulumi.Input[str],
|
250
255
|
opts: Optional[pulumi.ResourceOptions] = None,
|
251
|
-
aws: Optional[pulumi.Input[Sequence[pulumi.Input[
|
252
|
-
azures: Optional[pulumi.Input[Sequence[pulumi.Input[
|
256
|
+
aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
|
257
|
+
azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
|
253
258
|
namespace: Optional[pulumi.Input[str]] = None,
|
254
|
-
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
259
|
+
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None) -> 'Keys':
|
255
260
|
"""
|
256
261
|
Get an existing Keys resource's state with the given name, id, and optional extra
|
257
262
|
properties used to qualify the lookup.
|
@@ -259,10 +264,10 @@ class Keys(pulumi.CustomResource):
|
|
259
264
|
:param str resource_name: The unique name of the resulting resource.
|
260
265
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
261
266
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
262
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
263
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
267
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]] aws: Configuration block for AWS Managed Keys
|
268
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]] azures: Configuration block for Azure Managed Keys
|
264
269
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
265
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
270
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]] pkcs: Configuration block for PKCS Managed Keys
|
266
271
|
"""
|
267
272
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
268
273
|
|
pulumi_vault/managed/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
pulumi_vault/mfa_duo.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaDuoArgs', 'MfaDuo']
|
pulumi_vault/mfa_okta.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|
pulumi_vault/mfa_totp.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
pulumi_vault/mount.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MountArgs', 'Mount']
|
@@ -29,7 +34,7 @@ class MountArgs:
|
|
29
34
|
local: Optional[pulumi.Input[bool]] = None,
|
30
35
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
31
36
|
namespace: Optional[pulumi.Input[str]] = None,
|
32
|
-
options: Optional[pulumi.Input[Mapping[str,
|
37
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
33
38
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
34
39
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
35
40
|
seal_wrap: Optional[pulumi.Input[bool]] = None):
|
@@ -49,14 +54,15 @@ class MountArgs:
|
|
49
54
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
50
55
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
51
56
|
not provided, this will default to Vault's OIDC default key.
|
52
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
57
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
58
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
53
59
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
54
60
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
55
61
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
56
62
|
The value should not contain leading or trailing forward slashes.
|
57
63
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
58
64
|
*Available only for Vault Enterprise*.
|
59
|
-
:param pulumi.Input[Mapping[str,
|
65
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
60
66
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
61
67
|
the plugin.
|
62
68
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
@@ -240,7 +246,8 @@ class MountArgs:
|
|
240
246
|
@pulumi.getter(name="listingVisibility")
|
241
247
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
242
248
|
"""
|
243
|
-
Specifies whether to show this mount in the UI-specific
|
249
|
+
Specifies whether to show this mount in the UI-specific
|
250
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
244
251
|
"""
|
245
252
|
return pulumi.get(self, "listing_visibility")
|
246
253
|
|
@@ -289,14 +296,14 @@ class MountArgs:
|
|
289
296
|
|
290
297
|
@property
|
291
298
|
@pulumi.getter
|
292
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
299
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
293
300
|
"""
|
294
301
|
Specifies mount type specific options that are passed to the backend
|
295
302
|
"""
|
296
303
|
return pulumi.get(self, "options")
|
297
304
|
|
298
305
|
@options.setter
|
299
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
306
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
300
307
|
pulumi.set(self, "options", value)
|
301
308
|
|
302
309
|
@property
|
@@ -356,7 +363,7 @@ class _MountState:
|
|
356
363
|
local: Optional[pulumi.Input[bool]] = None,
|
357
364
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
358
365
|
namespace: Optional[pulumi.Input[str]] = None,
|
359
|
-
options: Optional[pulumi.Input[Mapping[str,
|
366
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
360
367
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
361
368
|
path: Optional[pulumi.Input[str]] = None,
|
362
369
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -377,14 +384,15 @@ class _MountState:
|
|
377
384
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
378
385
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
379
386
|
not provided, this will default to Vault's OIDC default key.
|
380
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
387
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
388
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
381
389
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
382
390
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
383
391
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
384
392
|
The value should not contain leading or trailing forward slashes.
|
385
393
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
386
394
|
*Available only for Vault Enterprise*.
|
387
|
-
:param pulumi.Input[Mapping[str,
|
395
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
388
396
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
389
397
|
the plugin.
|
390
398
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
@@ -562,7 +570,8 @@ class _MountState:
|
|
562
570
|
@pulumi.getter(name="listingVisibility")
|
563
571
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
564
572
|
"""
|
565
|
-
Specifies whether to show this mount in the UI-specific
|
573
|
+
Specifies whether to show this mount in the UI-specific
|
574
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
566
575
|
"""
|
567
576
|
return pulumi.get(self, "listing_visibility")
|
568
577
|
|
@@ -611,14 +620,14 @@ class _MountState:
|
|
611
620
|
|
612
621
|
@property
|
613
622
|
@pulumi.getter
|
614
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
623
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
615
624
|
"""
|
616
625
|
Specifies mount type specific options that are passed to the backend
|
617
626
|
"""
|
618
627
|
return pulumi.get(self, "options")
|
619
628
|
|
620
629
|
@options.setter
|
621
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
630
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
622
631
|
pulumi.set(self, "options", value)
|
623
632
|
|
624
633
|
@property
|
@@ -703,7 +712,7 @@ class Mount(pulumi.CustomResource):
|
|
703
712
|
local: Optional[pulumi.Input[bool]] = None,
|
704
713
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
705
714
|
namespace: Optional[pulumi.Input[str]] = None,
|
706
|
-
options: Optional[pulumi.Input[Mapping[str,
|
715
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
707
716
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
708
717
|
path: Optional[pulumi.Input[str]] = None,
|
709
718
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -748,7 +757,7 @@ class Mount(pulumi.CustomResource):
|
|
748
757
|
type="transit",
|
749
758
|
description="This is an example transit secret engine mount",
|
750
759
|
options={
|
751
|
-
"convergent_encryption":
|
760
|
+
"convergent_encryption": "false",
|
752
761
|
})
|
753
762
|
```
|
754
763
|
|
@@ -786,14 +795,15 @@ class Mount(pulumi.CustomResource):
|
|
786
795
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
787
796
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
788
797
|
not provided, this will default to Vault's OIDC default key.
|
789
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
798
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
799
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
790
800
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
791
801
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
792
802
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
793
803
|
The value should not contain leading or trailing forward slashes.
|
794
804
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
795
805
|
*Available only for Vault Enterprise*.
|
796
|
-
:param pulumi.Input[Mapping[str,
|
806
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
797
807
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
798
808
|
the plugin.
|
799
809
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
@@ -847,7 +857,7 @@ class Mount(pulumi.CustomResource):
|
|
847
857
|
type="transit",
|
848
858
|
description="This is an example transit secret engine mount",
|
849
859
|
options={
|
850
|
-
"convergent_encryption":
|
860
|
+
"convergent_encryption": "false",
|
851
861
|
})
|
852
862
|
```
|
853
863
|
|
@@ -899,7 +909,7 @@ class Mount(pulumi.CustomResource):
|
|
899
909
|
local: Optional[pulumi.Input[bool]] = None,
|
900
910
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
901
911
|
namespace: Optional[pulumi.Input[str]] = None,
|
902
|
-
options: Optional[pulumi.Input[Mapping[str,
|
912
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
903
913
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
904
914
|
path: Optional[pulumi.Input[str]] = None,
|
905
915
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -962,7 +972,7 @@ class Mount(pulumi.CustomResource):
|
|
962
972
|
local: Optional[pulumi.Input[bool]] = None,
|
963
973
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
964
974
|
namespace: Optional[pulumi.Input[str]] = None,
|
965
|
-
options: Optional[pulumi.Input[Mapping[str,
|
975
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
966
976
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
967
977
|
path: Optional[pulumi.Input[str]] = None,
|
968
978
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -988,14 +998,15 @@ class Mount(pulumi.CustomResource):
|
|
988
998
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
989
999
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
990
1000
|
not provided, this will default to Vault's OIDC default key.
|
991
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
1001
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
1002
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
992
1003
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
993
1004
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
994
1005
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
995
1006
|
The value should not contain leading or trailing forward slashes.
|
996
1007
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
997
1008
|
*Available only for Vault Enterprise*.
|
998
|
-
:param pulumi.Input[Mapping[str,
|
1009
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
999
1010
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
1000
1011
|
the plugin.
|
1001
1012
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
@@ -1118,7 +1129,8 @@ class Mount(pulumi.CustomResource):
|
|
1118
1129
|
@pulumi.getter(name="listingVisibility")
|
1119
1130
|
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1120
1131
|
"""
|
1121
|
-
Specifies whether to show this mount in the UI-specific
|
1132
|
+
Specifies whether to show this mount in the UI-specific
|
1133
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
1122
1134
|
"""
|
1123
1135
|
return pulumi.get(self, "listing_visibility")
|
1124
1136
|
|
@@ -1151,7 +1163,7 @@ class Mount(pulumi.CustomResource):
|
|
1151
1163
|
|
1152
1164
|
@property
|
1153
1165
|
@pulumi.getter
|
1154
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1166
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1155
1167
|
"""
|
1156
1168
|
Specifies mount type specific options that are passed to the backend
|
1157
1169
|
"""
|