pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +9 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +425 -200
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +523 -306
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +288 -70
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +383 -130
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +432 -186
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +3857 -2200
- pulumi_vault/database/outputs.py +2483 -1330
- pulumi_vault/database/secret_backend_connection.py +333 -112
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +283 -140
- pulumi_vault/database/secrets_mount.py +275 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +426 -205
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +420 -179
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +754 -533
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +720 -499
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +31 -36
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +174 -126
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -31
- pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +894 -644
- pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
- pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +2 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +96 -95
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +3 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +325 -0
- pulumi_vault/transit/get_verify.py +355 -0
- pulumi_vault/transit/secret_backend_key.py +394 -231
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,44 +20,44 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
address: pulumi.Input[str],
|
23
|
-
bootstrap: Optional[pulumi.Input[bool]] = None,
|
24
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
25
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
26
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
27
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
28
|
-
description: Optional[pulumi.Input[str]] = None,
|
29
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
30
|
-
local: Optional[pulumi.Input[bool]] = None,
|
31
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
32
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
33
|
-
path: Optional[pulumi.Input[str]] = None,
|
34
|
-
scheme: Optional[pulumi.Input[str]] = None,
|
35
|
-
token: Optional[pulumi.Input[str]] = None):
|
23
|
+
address: pulumi.Input[builtins.str],
|
24
|
+
bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
|
25
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
29
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
31
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
32
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
33
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
34
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
35
|
+
scheme: Optional[pulumi.Input[builtins.str]] = None,
|
36
|
+
token: Optional[pulumi.Input[builtins.str]] = None):
|
36
37
|
"""
|
37
38
|
The set of arguments for constructing a SecretBackend resource.
|
38
|
-
:param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
39
|
-
:param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
40
|
-
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
41
|
-
:param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
39
|
+
:param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
40
|
+
:param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
41
|
+
:param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
42
|
+
:param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
42
43
|
this is set you need to also set client_key.
|
43
|
-
:param pulumi.Input[str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
44
|
+
:param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
44
45
|
you need to also set client_cert.
|
45
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
46
|
-
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
47
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
46
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
47
|
+
:param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
|
48
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
48
49
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
49
|
-
:param pulumi.Input[bool] local: Specifies if the secret backend is local only.
|
50
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
50
|
+
:param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
|
51
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
51
52
|
for credentials issued by this backend.
|
52
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
53
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
53
54
|
The value should not contain leading or trailing forward slashes.
|
54
55
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
55
56
|
*Available only for Vault Enterprise*.
|
56
|
-
:param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
57
|
+
:param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
57
58
|
to `consul`.
|
58
|
-
:param pulumi.Input[str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
59
|
-
:param pulumi.Input[str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
59
|
+
:param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
60
|
+
:param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
60
61
|
"""
|
61
62
|
pulumi.set(__self__, "address", address)
|
62
63
|
if bootstrap is not None:
|
@@ -88,43 +89,43 @@ class SecretBackendArgs:
|
|
88
89
|
|
89
90
|
@property
|
90
91
|
@pulumi.getter
|
91
|
-
def address(self) -> pulumi.Input[str]:
|
92
|
+
def address(self) -> pulumi.Input[builtins.str]:
|
92
93
|
"""
|
93
94
|
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
94
95
|
"""
|
95
96
|
return pulumi.get(self, "address")
|
96
97
|
|
97
98
|
@address.setter
|
98
|
-
def address(self, value: pulumi.Input[str]):
|
99
|
+
def address(self, value: pulumi.Input[builtins.str]):
|
99
100
|
pulumi.set(self, "address", value)
|
100
101
|
|
101
102
|
@property
|
102
103
|
@pulumi.getter
|
103
|
-
def bootstrap(self) -> Optional[pulumi.Input[bool]]:
|
104
|
+
def bootstrap(self) -> Optional[pulumi.Input[builtins.bool]]:
|
104
105
|
"""
|
105
106
|
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
106
107
|
"""
|
107
108
|
return pulumi.get(self, "bootstrap")
|
108
109
|
|
109
110
|
@bootstrap.setter
|
110
|
-
def bootstrap(self, value: Optional[pulumi.Input[bool]]):
|
111
|
+
def bootstrap(self, value: Optional[pulumi.Input[builtins.bool]]):
|
111
112
|
pulumi.set(self, "bootstrap", value)
|
112
113
|
|
113
114
|
@property
|
114
115
|
@pulumi.getter(name="caCert")
|
115
|
-
def ca_cert(self) -> Optional[pulumi.Input[str]]:
|
116
|
+
def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
116
117
|
"""
|
117
118
|
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
118
119
|
"""
|
119
120
|
return pulumi.get(self, "ca_cert")
|
120
121
|
|
121
122
|
@ca_cert.setter
|
122
|
-
def ca_cert(self, value: Optional[pulumi.Input[str]]):
|
123
|
+
def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
123
124
|
pulumi.set(self, "ca_cert", value)
|
124
125
|
|
125
126
|
@property
|
126
127
|
@pulumi.getter(name="clientCert")
|
127
|
-
def client_cert(self) -> Optional[pulumi.Input[str]]:
|
128
|
+
def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
128
129
|
"""
|
129
130
|
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
130
131
|
this is set you need to also set client_key.
|
@@ -132,12 +133,12 @@ class SecretBackendArgs:
|
|
132
133
|
return pulumi.get(self, "client_cert")
|
133
134
|
|
134
135
|
@client_cert.setter
|
135
|
-
def client_cert(self, value: Optional[pulumi.Input[str]]):
|
136
|
+
def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
136
137
|
pulumi.set(self, "client_cert", value)
|
137
138
|
|
138
139
|
@property
|
139
140
|
@pulumi.getter(name="clientKey")
|
140
|
-
def client_key(self) -> Optional[pulumi.Input[str]]:
|
141
|
+
def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
141
142
|
"""
|
142
143
|
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
143
144
|
you need to also set client_cert.
|
@@ -145,36 +146,36 @@ class SecretBackendArgs:
|
|
145
146
|
return pulumi.get(self, "client_key")
|
146
147
|
|
147
148
|
@client_key.setter
|
148
|
-
def client_key(self, value: Optional[pulumi.Input[str]]):
|
149
|
+
def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
149
150
|
pulumi.set(self, "client_key", value)
|
150
151
|
|
151
152
|
@property
|
152
153
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
153
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
154
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
154
155
|
"""
|
155
156
|
The default TTL for credentials issued by this backend.
|
156
157
|
"""
|
157
158
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
158
159
|
|
159
160
|
@default_lease_ttl_seconds.setter
|
160
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
161
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
161
162
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
162
163
|
|
163
164
|
@property
|
164
165
|
@pulumi.getter
|
165
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
166
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
166
167
|
"""
|
167
168
|
A human-friendly description for this backend.
|
168
169
|
"""
|
169
170
|
return pulumi.get(self, "description")
|
170
171
|
|
171
172
|
@description.setter
|
172
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
173
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
173
174
|
pulumi.set(self, "description", value)
|
174
175
|
|
175
176
|
@property
|
176
177
|
@pulumi.getter(name="disableRemount")
|
177
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
178
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
178
179
|
"""
|
179
180
|
If set, opts out of mount migration on path updates.
|
180
181
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -182,24 +183,24 @@ class SecretBackendArgs:
|
|
182
183
|
return pulumi.get(self, "disable_remount")
|
183
184
|
|
184
185
|
@disable_remount.setter
|
185
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
186
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
186
187
|
pulumi.set(self, "disable_remount", value)
|
187
188
|
|
188
189
|
@property
|
189
190
|
@pulumi.getter
|
190
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
191
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
191
192
|
"""
|
192
193
|
Specifies if the secret backend is local only.
|
193
194
|
"""
|
194
195
|
return pulumi.get(self, "local")
|
195
196
|
|
196
197
|
@local.setter
|
197
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
198
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
198
199
|
pulumi.set(self, "local", value)
|
199
200
|
|
200
201
|
@property
|
201
202
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
202
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
203
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
203
204
|
"""
|
204
205
|
The maximum TTL that can be requested
|
205
206
|
for credentials issued by this backend.
|
@@ -207,12 +208,12 @@ class SecretBackendArgs:
|
|
207
208
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
208
209
|
|
209
210
|
@max_lease_ttl_seconds.setter
|
210
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
211
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
211
212
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
212
213
|
|
213
214
|
@property
|
214
215
|
@pulumi.getter
|
215
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
216
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
216
217
|
"""
|
217
218
|
The namespace to provision the resource in.
|
218
219
|
The value should not contain leading or trailing forward slashes.
|
@@ -222,12 +223,12 @@ class SecretBackendArgs:
|
|
222
223
|
return pulumi.get(self, "namespace")
|
223
224
|
|
224
225
|
@namespace.setter
|
225
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
226
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
226
227
|
pulumi.set(self, "namespace", value)
|
227
228
|
|
228
229
|
@property
|
229
230
|
@pulumi.getter
|
230
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
231
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
231
232
|
"""
|
232
233
|
The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
233
234
|
to `consul`.
|
@@ -235,75 +236,75 @@ class SecretBackendArgs:
|
|
235
236
|
return pulumi.get(self, "path")
|
236
237
|
|
237
238
|
@path.setter
|
238
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
239
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
239
240
|
pulumi.set(self, "path", value)
|
240
241
|
|
241
242
|
@property
|
242
243
|
@pulumi.getter
|
243
|
-
def scheme(self) -> Optional[pulumi.Input[str]]:
|
244
|
+
def scheme(self) -> Optional[pulumi.Input[builtins.str]]:
|
244
245
|
"""
|
245
246
|
Specifies the URL scheme to use. Defaults to `http`.
|
246
247
|
"""
|
247
248
|
return pulumi.get(self, "scheme")
|
248
249
|
|
249
250
|
@scheme.setter
|
250
|
-
def scheme(self, value: Optional[pulumi.Input[str]]):
|
251
|
+
def scheme(self, value: Optional[pulumi.Input[builtins.str]]):
|
251
252
|
pulumi.set(self, "scheme", value)
|
252
253
|
|
253
254
|
@property
|
254
255
|
@pulumi.getter
|
255
|
-
def token(self) -> Optional[pulumi.Input[str]]:
|
256
|
+
def token(self) -> Optional[pulumi.Input[builtins.str]]:
|
256
257
|
"""
|
257
258
|
Specifies the Consul token to use when managing or issuing new tokens.
|
258
259
|
"""
|
259
260
|
return pulumi.get(self, "token")
|
260
261
|
|
261
262
|
@token.setter
|
262
|
-
def token(self, value: Optional[pulumi.Input[str]]):
|
263
|
+
def token(self, value: Optional[pulumi.Input[builtins.str]]):
|
263
264
|
pulumi.set(self, "token", value)
|
264
265
|
|
265
266
|
|
266
267
|
@pulumi.input_type
|
267
268
|
class _SecretBackendState:
|
268
269
|
def __init__(__self__, *,
|
269
|
-
address: Optional[pulumi.Input[str]] = None,
|
270
|
-
bootstrap: Optional[pulumi.Input[bool]] = None,
|
271
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
272
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
273
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
274
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
275
|
-
description: Optional[pulumi.Input[str]] = None,
|
276
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
277
|
-
local: Optional[pulumi.Input[bool]] = None,
|
278
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
279
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
280
|
-
path: Optional[pulumi.Input[str]] = None,
|
281
|
-
scheme: Optional[pulumi.Input[str]] = None,
|
282
|
-
token: Optional[pulumi.Input[str]] = None):
|
270
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
271
|
+
bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
|
272
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
273
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
274
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
275
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
276
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
277
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
278
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
279
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
280
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
281
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
282
|
+
scheme: Optional[pulumi.Input[builtins.str]] = None,
|
283
|
+
token: Optional[pulumi.Input[builtins.str]] = None):
|
283
284
|
"""
|
284
285
|
Input properties used for looking up and filtering SecretBackend resources.
|
285
|
-
:param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
286
|
-
:param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
287
|
-
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
288
|
-
:param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
286
|
+
:param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
287
|
+
:param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
288
|
+
:param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
289
|
+
:param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
289
290
|
this is set you need to also set client_key.
|
290
|
-
:param pulumi.Input[str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
291
|
+
:param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
291
292
|
you need to also set client_cert.
|
292
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
293
|
-
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
294
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
293
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
294
|
+
:param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
|
295
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
295
296
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
296
|
-
:param pulumi.Input[bool] local: Specifies if the secret backend is local only.
|
297
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
297
|
+
:param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
|
298
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
298
299
|
for credentials issued by this backend.
|
299
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
300
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
300
301
|
The value should not contain leading or trailing forward slashes.
|
301
302
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
302
303
|
*Available only for Vault Enterprise*.
|
303
|
-
:param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
304
|
+
:param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
304
305
|
to `consul`.
|
305
|
-
:param pulumi.Input[str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
306
|
-
:param pulumi.Input[str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
306
|
+
:param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
307
|
+
:param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
307
308
|
"""
|
308
309
|
if address is not None:
|
309
310
|
pulumi.set(__self__, "address", address)
|
@@ -336,43 +337,43 @@ class _SecretBackendState:
|
|
336
337
|
|
337
338
|
@property
|
338
339
|
@pulumi.getter
|
339
|
-
def address(self) -> Optional[pulumi.Input[str]]:
|
340
|
+
def address(self) -> Optional[pulumi.Input[builtins.str]]:
|
340
341
|
"""
|
341
342
|
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
342
343
|
"""
|
343
344
|
return pulumi.get(self, "address")
|
344
345
|
|
345
346
|
@address.setter
|
346
|
-
def address(self, value: Optional[pulumi.Input[str]]):
|
347
|
+
def address(self, value: Optional[pulumi.Input[builtins.str]]):
|
347
348
|
pulumi.set(self, "address", value)
|
348
349
|
|
349
350
|
@property
|
350
351
|
@pulumi.getter
|
351
|
-
def bootstrap(self) -> Optional[pulumi.Input[bool]]:
|
352
|
+
def bootstrap(self) -> Optional[pulumi.Input[builtins.bool]]:
|
352
353
|
"""
|
353
354
|
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
354
355
|
"""
|
355
356
|
return pulumi.get(self, "bootstrap")
|
356
357
|
|
357
358
|
@bootstrap.setter
|
358
|
-
def bootstrap(self, value: Optional[pulumi.Input[bool]]):
|
359
|
+
def bootstrap(self, value: Optional[pulumi.Input[builtins.bool]]):
|
359
360
|
pulumi.set(self, "bootstrap", value)
|
360
361
|
|
361
362
|
@property
|
362
363
|
@pulumi.getter(name="caCert")
|
363
|
-
def ca_cert(self) -> Optional[pulumi.Input[str]]:
|
364
|
+
def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
364
365
|
"""
|
365
366
|
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
366
367
|
"""
|
367
368
|
return pulumi.get(self, "ca_cert")
|
368
369
|
|
369
370
|
@ca_cert.setter
|
370
|
-
def ca_cert(self, value: Optional[pulumi.Input[str]]):
|
371
|
+
def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
371
372
|
pulumi.set(self, "ca_cert", value)
|
372
373
|
|
373
374
|
@property
|
374
375
|
@pulumi.getter(name="clientCert")
|
375
|
-
def client_cert(self) -> Optional[pulumi.Input[str]]:
|
376
|
+
def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
376
377
|
"""
|
377
378
|
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
378
379
|
this is set you need to also set client_key.
|
@@ -380,12 +381,12 @@ class _SecretBackendState:
|
|
380
381
|
return pulumi.get(self, "client_cert")
|
381
382
|
|
382
383
|
@client_cert.setter
|
383
|
-
def client_cert(self, value: Optional[pulumi.Input[str]]):
|
384
|
+
def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
384
385
|
pulumi.set(self, "client_cert", value)
|
385
386
|
|
386
387
|
@property
|
387
388
|
@pulumi.getter(name="clientKey")
|
388
|
-
def client_key(self) -> Optional[pulumi.Input[str]]:
|
389
|
+
def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
389
390
|
"""
|
390
391
|
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
391
392
|
you need to also set client_cert.
|
@@ -393,36 +394,36 @@ class _SecretBackendState:
|
|
393
394
|
return pulumi.get(self, "client_key")
|
394
395
|
|
395
396
|
@client_key.setter
|
396
|
-
def client_key(self, value: Optional[pulumi.Input[str]]):
|
397
|
+
def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
397
398
|
pulumi.set(self, "client_key", value)
|
398
399
|
|
399
400
|
@property
|
400
401
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
401
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
402
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
402
403
|
"""
|
403
404
|
The default TTL for credentials issued by this backend.
|
404
405
|
"""
|
405
406
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
406
407
|
|
407
408
|
@default_lease_ttl_seconds.setter
|
408
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
409
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
409
410
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
410
411
|
|
411
412
|
@property
|
412
413
|
@pulumi.getter
|
413
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
414
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
414
415
|
"""
|
415
416
|
A human-friendly description for this backend.
|
416
417
|
"""
|
417
418
|
return pulumi.get(self, "description")
|
418
419
|
|
419
420
|
@description.setter
|
420
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
421
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
421
422
|
pulumi.set(self, "description", value)
|
422
423
|
|
423
424
|
@property
|
424
425
|
@pulumi.getter(name="disableRemount")
|
425
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
426
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
426
427
|
"""
|
427
428
|
If set, opts out of mount migration on path updates.
|
428
429
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -430,24 +431,24 @@ class _SecretBackendState:
|
|
430
431
|
return pulumi.get(self, "disable_remount")
|
431
432
|
|
432
433
|
@disable_remount.setter
|
433
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
434
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
434
435
|
pulumi.set(self, "disable_remount", value)
|
435
436
|
|
436
437
|
@property
|
437
438
|
@pulumi.getter
|
438
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
439
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
439
440
|
"""
|
440
441
|
Specifies if the secret backend is local only.
|
441
442
|
"""
|
442
443
|
return pulumi.get(self, "local")
|
443
444
|
|
444
445
|
@local.setter
|
445
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
446
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
446
447
|
pulumi.set(self, "local", value)
|
447
448
|
|
448
449
|
@property
|
449
450
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
450
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
451
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
451
452
|
"""
|
452
453
|
The maximum TTL that can be requested
|
453
454
|
for credentials issued by this backend.
|
@@ -455,12 +456,12 @@ class _SecretBackendState:
|
|
455
456
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
456
457
|
|
457
458
|
@max_lease_ttl_seconds.setter
|
458
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
459
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
459
460
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
460
461
|
|
461
462
|
@property
|
462
463
|
@pulumi.getter
|
463
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
464
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
464
465
|
"""
|
465
466
|
The namespace to provision the resource in.
|
466
467
|
The value should not contain leading or trailing forward slashes.
|
@@ -470,12 +471,12 @@ class _SecretBackendState:
|
|
470
471
|
return pulumi.get(self, "namespace")
|
471
472
|
|
472
473
|
@namespace.setter
|
473
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
474
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
474
475
|
pulumi.set(self, "namespace", value)
|
475
476
|
|
476
477
|
@property
|
477
478
|
@pulumi.getter
|
478
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
479
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
479
480
|
"""
|
480
481
|
The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
481
482
|
to `consul`.
|
@@ -483,31 +484,31 @@ class _SecretBackendState:
|
|
483
484
|
return pulumi.get(self, "path")
|
484
485
|
|
485
486
|
@path.setter
|
486
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
487
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
487
488
|
pulumi.set(self, "path", value)
|
488
489
|
|
489
490
|
@property
|
490
491
|
@pulumi.getter
|
491
|
-
def scheme(self) -> Optional[pulumi.Input[str]]:
|
492
|
+
def scheme(self) -> Optional[pulumi.Input[builtins.str]]:
|
492
493
|
"""
|
493
494
|
Specifies the URL scheme to use. Defaults to `http`.
|
494
495
|
"""
|
495
496
|
return pulumi.get(self, "scheme")
|
496
497
|
|
497
498
|
@scheme.setter
|
498
|
-
def scheme(self, value: Optional[pulumi.Input[str]]):
|
499
|
+
def scheme(self, value: Optional[pulumi.Input[builtins.str]]):
|
499
500
|
pulumi.set(self, "scheme", value)
|
500
501
|
|
501
502
|
@property
|
502
503
|
@pulumi.getter
|
503
|
-
def token(self) -> Optional[pulumi.Input[str]]:
|
504
|
+
def token(self) -> Optional[pulumi.Input[builtins.str]]:
|
504
505
|
"""
|
505
506
|
Specifies the Consul token to use when managing or issuing new tokens.
|
506
507
|
"""
|
507
508
|
return pulumi.get(self, "token")
|
508
509
|
|
509
510
|
@token.setter
|
510
|
-
def token(self, value: Optional[pulumi.Input[str]]):
|
511
|
+
def token(self, value: Optional[pulumi.Input[builtins.str]]):
|
511
512
|
pulumi.set(self, "token", value)
|
512
513
|
|
513
514
|
|
@@ -516,20 +517,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
516
517
|
def __init__(__self__,
|
517
518
|
resource_name: str,
|
518
519
|
opts: Optional[pulumi.ResourceOptions] = None,
|
519
|
-
address: Optional[pulumi.Input[str]] = None,
|
520
|
-
bootstrap: Optional[pulumi.Input[bool]] = None,
|
521
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
522
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
523
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
524
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
525
|
-
description: Optional[pulumi.Input[str]] = None,
|
526
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
527
|
-
local: Optional[pulumi.Input[bool]] = None,
|
528
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
529
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
530
|
-
path: Optional[pulumi.Input[str]] = None,
|
531
|
-
scheme: Optional[pulumi.Input[str]] = None,
|
532
|
-
token: Optional[pulumi.Input[str]] = None,
|
520
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
521
|
+
bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
|
522
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
523
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
524
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
525
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
526
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
527
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
528
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
529
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
530
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
531
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
532
|
+
scheme: Optional[pulumi.Input[builtins.str]] = None,
|
533
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
533
534
|
__props__=None):
|
534
535
|
"""
|
535
536
|
## Example Usage
|
@@ -568,28 +569,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
568
569
|
|
569
570
|
:param str resource_name: The name of the resource.
|
570
571
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
571
|
-
:param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
572
|
-
:param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
573
|
-
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
574
|
-
:param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
572
|
+
:param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
573
|
+
:param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
574
|
+
:param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
575
|
+
:param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
575
576
|
this is set you need to also set client_key.
|
576
|
-
:param pulumi.Input[str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
577
|
+
:param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
577
578
|
you need to also set client_cert.
|
578
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
579
|
-
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
580
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
579
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
580
|
+
:param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
|
581
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
581
582
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
582
|
-
:param pulumi.Input[bool] local: Specifies if the secret backend is local only.
|
583
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
583
|
+
:param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
|
584
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
584
585
|
for credentials issued by this backend.
|
585
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
586
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
586
587
|
The value should not contain leading or trailing forward slashes.
|
587
588
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
588
589
|
*Available only for Vault Enterprise*.
|
589
|
-
:param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
590
|
+
:param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
590
591
|
to `consul`.
|
591
|
-
:param pulumi.Input[str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
592
|
-
:param pulumi.Input[str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
592
|
+
:param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
593
|
+
:param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
593
594
|
"""
|
594
595
|
...
|
595
596
|
@overload
|
@@ -647,20 +648,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
647
648
|
def _internal_init(__self__,
|
648
649
|
resource_name: str,
|
649
650
|
opts: Optional[pulumi.ResourceOptions] = None,
|
650
|
-
address: Optional[pulumi.Input[str]] = None,
|
651
|
-
bootstrap: Optional[pulumi.Input[bool]] = None,
|
652
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
653
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
654
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
655
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
656
|
-
description: Optional[pulumi.Input[str]] = None,
|
657
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
658
|
-
local: Optional[pulumi.Input[bool]] = None,
|
659
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
660
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
661
|
-
path: Optional[pulumi.Input[str]] = None,
|
662
|
-
scheme: Optional[pulumi.Input[str]] = None,
|
663
|
-
token: Optional[pulumi.Input[str]] = None,
|
651
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
652
|
+
bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
|
653
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
654
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
655
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
656
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
657
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
658
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
659
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
660
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
661
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
662
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
663
|
+
scheme: Optional[pulumi.Input[builtins.str]] = None,
|
664
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
664
665
|
__props__=None):
|
665
666
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
666
667
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -698,20 +699,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
698
699
|
def get(resource_name: str,
|
699
700
|
id: pulumi.Input[str],
|
700
701
|
opts: Optional[pulumi.ResourceOptions] = None,
|
701
|
-
address: Optional[pulumi.Input[str]] = None,
|
702
|
-
bootstrap: Optional[pulumi.Input[bool]] = None,
|
703
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
704
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
705
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
706
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
707
|
-
description: Optional[pulumi.Input[str]] = None,
|
708
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
709
|
-
local: Optional[pulumi.Input[bool]] = None,
|
710
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
711
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
712
|
-
path: Optional[pulumi.Input[str]] = None,
|
713
|
-
scheme: Optional[pulumi.Input[str]] = None,
|
714
|
-
token: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
|
702
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
703
|
+
bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
|
704
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
705
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
706
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
707
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
708
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
709
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
710
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
711
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
712
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
713
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
714
|
+
scheme: Optional[pulumi.Input[builtins.str]] = None,
|
715
|
+
token: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
|
715
716
|
"""
|
716
717
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
717
718
|
properties used to qualify the lookup.
|
@@ -719,28 +720,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
719
720
|
:param str resource_name: The unique name of the resulting resource.
|
720
721
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
721
722
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
722
|
-
:param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
723
|
-
:param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
724
|
-
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
725
|
-
:param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
723
|
+
:param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
724
|
+
:param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
725
|
+
:param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
726
|
+
:param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
726
727
|
this is set you need to also set client_key.
|
727
|
-
:param pulumi.Input[str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
728
|
+
:param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
728
729
|
you need to also set client_cert.
|
729
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
730
|
-
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
731
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
730
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
731
|
+
:param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
|
732
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
732
733
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
733
|
-
:param pulumi.Input[bool] local: Specifies if the secret backend is local only.
|
734
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
734
|
+
:param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
|
735
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
735
736
|
for credentials issued by this backend.
|
736
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
737
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
737
738
|
The value should not contain leading or trailing forward slashes.
|
738
739
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
739
740
|
*Available only for Vault Enterprise*.
|
740
|
-
:param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
741
|
+
:param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
741
742
|
to `consul`.
|
742
|
-
:param pulumi.Input[str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
743
|
-
:param pulumi.Input[str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
743
|
+
:param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
744
|
+
:param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
744
745
|
"""
|
745
746
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
746
747
|
|
@@ -764,7 +765,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
764
765
|
|
765
766
|
@property
|
766
767
|
@pulumi.getter
|
767
|
-
def address(self) -> pulumi.Output[str]:
|
768
|
+
def address(self) -> pulumi.Output[builtins.str]:
|
768
769
|
"""
|
769
770
|
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
770
771
|
"""
|
@@ -772,7 +773,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
772
773
|
|
773
774
|
@property
|
774
775
|
@pulumi.getter
|
775
|
-
def bootstrap(self) -> pulumi.Output[Optional[bool]]:
|
776
|
+
def bootstrap(self) -> pulumi.Output[Optional[builtins.bool]]:
|
776
777
|
"""
|
777
778
|
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
778
779
|
"""
|
@@ -780,7 +781,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
780
781
|
|
781
782
|
@property
|
782
783
|
@pulumi.getter(name="caCert")
|
783
|
-
def ca_cert(self) -> pulumi.Output[Optional[str]]:
|
784
|
+
def ca_cert(self) -> pulumi.Output[Optional[builtins.str]]:
|
784
785
|
"""
|
785
786
|
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
786
787
|
"""
|
@@ -788,7 +789,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
788
789
|
|
789
790
|
@property
|
790
791
|
@pulumi.getter(name="clientCert")
|
791
|
-
def client_cert(self) -> pulumi.Output[Optional[str]]:
|
792
|
+
def client_cert(self) -> pulumi.Output[Optional[builtins.str]]:
|
792
793
|
"""
|
793
794
|
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
794
795
|
this is set you need to also set client_key.
|
@@ -797,7 +798,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
797
798
|
|
798
799
|
@property
|
799
800
|
@pulumi.getter(name="clientKey")
|
800
|
-
def client_key(self) -> pulumi.Output[Optional[str]]:
|
801
|
+
def client_key(self) -> pulumi.Output[Optional[builtins.str]]:
|
801
802
|
"""
|
802
803
|
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
803
804
|
you need to also set client_cert.
|
@@ -806,7 +807,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
806
807
|
|
807
808
|
@property
|
808
809
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
809
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[int]]:
|
810
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
|
810
811
|
"""
|
811
812
|
The default TTL for credentials issued by this backend.
|
812
813
|
"""
|
@@ -814,7 +815,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
814
815
|
|
815
816
|
@property
|
816
817
|
@pulumi.getter
|
817
|
-
def description(self) -> pulumi.Output[Optional[str]]:
|
818
|
+
def description(self) -> pulumi.Output[Optional[builtins.str]]:
|
818
819
|
"""
|
819
820
|
A human-friendly description for this backend.
|
820
821
|
"""
|
@@ -822,7 +823,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
822
823
|
|
823
824
|
@property
|
824
825
|
@pulumi.getter(name="disableRemount")
|
825
|
-
def disable_remount(self) -> pulumi.Output[Optional[bool]]:
|
826
|
+
def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
|
826
827
|
"""
|
827
828
|
If set, opts out of mount migration on path updates.
|
828
829
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -831,7 +832,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
831
832
|
|
832
833
|
@property
|
833
834
|
@pulumi.getter
|
834
|
-
def local(self) -> pulumi.Output[Optional[bool]]:
|
835
|
+
def local(self) -> pulumi.Output[Optional[builtins.bool]]:
|
835
836
|
"""
|
836
837
|
Specifies if the secret backend is local only.
|
837
838
|
"""
|
@@ -839,7 +840,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
839
840
|
|
840
841
|
@property
|
841
842
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
842
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[int]]:
|
843
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
|
843
844
|
"""
|
844
845
|
The maximum TTL that can be requested
|
845
846
|
for credentials issued by this backend.
|
@@ -848,7 +849,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
848
849
|
|
849
850
|
@property
|
850
851
|
@pulumi.getter
|
851
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
852
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
852
853
|
"""
|
853
854
|
The namespace to provision the resource in.
|
854
855
|
The value should not contain leading or trailing forward slashes.
|
@@ -859,7 +860,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
859
860
|
|
860
861
|
@property
|
861
862
|
@pulumi.getter
|
862
|
-
def path(self) -> pulumi.Output[Optional[str]]:
|
863
|
+
def path(self) -> pulumi.Output[Optional[builtins.str]]:
|
863
864
|
"""
|
864
865
|
The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
865
866
|
to `consul`.
|
@@ -868,7 +869,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
868
869
|
|
869
870
|
@property
|
870
871
|
@pulumi.getter
|
871
|
-
def scheme(self) -> pulumi.Output[Optional[str]]:
|
872
|
+
def scheme(self) -> pulumi.Output[Optional[builtins.str]]:
|
872
873
|
"""
|
873
874
|
Specifies the URL scheme to use. Defaults to `http`.
|
874
875
|
"""
|
@@ -876,7 +877,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
876
877
|
|
877
878
|
@property
|
878
879
|
@pulumi.getter
|
879
|
-
def token(self) -> pulumi.Output[Optional[str]]:
|
880
|
+
def token(self) -> pulumi.Output[Optional[builtins.str]]:
|
880
881
|
"""
|
881
882
|
Specifies the Consul token to use when managing or issuing new tokens.
|
882
883
|
"""
|